Search This Blog

Wednesday, March 12, 2014

Patch Tuesday: Microsoft closes critical holes in IE, Windows

Has mobile computing had a positive impact on cybersecurity? | Juniper Networks not giving up firewall patent fight vs. Palo Alto Networks

Network World Security

Forward this to a Friend >>>


Patch Tuesday: Microsoft closes critical holes in IE, Windows
It's Patch Tuesday again, and the first one to jump on will patch the critical zero-day vulnerability in Internet Explorer that attackers have been actively exploiting in the wild since February. Read More


WHITE PAPER: HP ArcSight

Magic Quadrant for Security Information and Event Management
The security information and event management (SIEM) market is defined by the customer's need to analyze security event data in real time for internal and external threat management, and to collect, store, analyze and report on log data for incident response, forensics and regulatory compliance. Learn More

WHITE PAPER: IBM

Pay-as-you-Grow Data Protection
IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions they need, and add new functionalities as they grow. Read Now

Has mobile computing had a positive impact on cybersecurity?
Counterintuitive perspective, but in the end, mobile computing chaos may help improve enterprise cybersecurity strategy. Read More

Juniper Networks not giving up firewall patent fight vs. Palo Alto Networks
Juniper Networks' legal battle against Palo Alto Networks claiming infringement of application-firewall patents ended in a mistrial being declared in a Delaware court, but Juniper says it intends to haul Palo Alto back into court again. Read More

NASA setting stage for asteroid mission
NASA today said it will officially begin seeking the company or companies that it will contract with to begin the mission to capture an asteroid and move it near the moon, where it could be studied and perhaps mined. A Broad Agency Announcement or BAA on the Asteroid Redirect Mission (ARM)will be published March 21, NASA said. Read More

Computer science enrollments rocketed last year, up 22%
A sneak peek at the annual Computing Research Association's (CRA) report on computer science enrollments at colleges shows that strong demand for technically-savvy workers is luring students in a big way. Read More


WHITE PAPER: CDW

Securing BYOD
Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are responding to the capabilities and flexibility that mobile devices provide. Read Now

Cyberattacks could paralyze U.S., former defense chief warns
As the U.S. Secretary of Defense, Leon Panetta delivered strong warnings about the risks of cyberattacks on the country. His conviction that a possible 'cyber Pearl Harbor' may be looming has not tempered since leaving the post last year. Read More

How to protect virtual machines (VMs)
These four products represent different approaches to VM security Read More

US Energy Dept. deals $10M to ride ocean wave energy
The Energy Department said it would spend $10 million to help kick-start unique energy technology that converts ocean waves and currents into electricity. Read More

Navy network hack has valuable lessons for companies
The hacking of a U.S. military network that was made easier by a poorly written contract with Hewlett-Packard offers lessons on how negotiations between customer and service provider could lead to weakened security. Read More


WHITE PAPER: HP ArcSight

Big Security for Big Data
In order to meet current security problems, a new paradigm shift needs to occur. Businesses need the ability to secure data, collect it, and aggregate into an intelligent format, so that real-time alerting and reporting can take place. This white paper will give you the information you need to get started. Learn More

Top 5 skills needed for a SOC analyst
Building a Security Operations Center (SOC) from scratch or revamping an underperforming one is a daunting leadership challenge. Of all the tasks you have to think about, finding and hiring a set of SOC analysts with the right skill set has to be a top priority. Read More

The cost of doing business at the RSA Conference
Each year, hundreds of vendors head to the RSA Conference in San Francisco, California, arguably the largest security gathering in the U.S. For many of those vendors, the show is a requirement, but there's a steep cost involved. For smaller companies, the show can create a sink or swim environment. Read More

U.S. retailers insist on PIN requirement in smartcard rules
U.S. retailers are digging in their heels over their need for PIN authentication for Europay MasterCard Visa (EMV) smartcard use here. Read More

Italian police investigate Skype use for 'porno blackmail'
Italian police in Genoa have opened an investigation into the use of Skype to trap victims into online sexual indiscretions, which are recorded and used as a pretext for extortion. Read More


SLIDESHOWS

How to protect virtual machines (VMs)

These four products represent different approaches to VM security.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Embarrassing stories shed light on U.S. officials' technological ignorance

2. Use of H-1B alternative skyrockets

3. Why IBM thinks Windows Phone is best for the enterprise

4. iPhone, Galaxy, iPad, Nexus: Here's how they really rate

5. 3 ways to get a new Windows 7 PC in the Windows 8 era

6. Lifestyles of the rich and famous on display at Luxury Tech Show

7. Perspective: Microsoft risks security reputation ruin by retiring XP

8. iOS 7.1 goes live, with UI tweaks, bug fixes

9. Virtual machine (VM) security still a work in progress

10. Google and Verizon take big steps in the cloud


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: