Search This Blog

Monday, March 10, 2014

The greatest security story never told -- how Microsoft's SDL saved Windows

What CISOs Can Do About the Cybersecurity Skills Shortage | Encrypted communications take center stage

Network World Security

Forward this to a Friend >>>


The greatest security story never told -- how Microsoft's SDL saved Windows
Microsoft has launched a new website to "tell the untold story" of something it believes changed the history of Windows security and indeed Microsoft itself a the Software Development Lifecycle or plain 'SDL' for short. Read More


RESOURCE COMPLIMENTS OF: Dell

Achieve Deeper Network Security and Control
Next-generation firewalls (NGFWs) revolutionized network security. Traditional firewalls that only focus on stateful packet inspection and access control rules are ineffective in today's advanced-threat environment. To protect your organization from threats, your NGFW must be able to deliver a deeper level of network security. Learn why Dell™ SonicWALL™ NGFWs are the only firewalls capable of providing organizations of any size with the proper level of network security.

WHITE PAPER: IBM

Streamline Data Protection with Storage Manager
IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup and Restore, TSM is a far more comprehensive data-protection solution. Read Now

What CISOs Can Do About the Cybersecurity Skills Shortage
I had the opportunity to present some of my research on the IT security skills shortage at last week's RSA Conference. This is a serious issue that doesn't get nearly enough attention. Read More

Encrypted communications take center stage
The first Cebit trade show in the post-Snowden era will focus on security, showing off locally developed bug-proof phones and messaging systems, as well as the ability to protect mobile devices using smartcards. Read More

US intelligence group wants software to decide who is trustworthy
In the security business one can never have enough trust. And one government group now wants your help in developing a software program that could help decide who's trustworthy and who isn't. Read More


WHITE PAPER: IBM

Pay-as-you-Grow Data Protection
IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions they need, and add new functionalities as they grow. Read Now

U.S. spy agencies adopt new IT approach
The CIA's decision to use Amazon's cloud is part of a broader IT shake-up to make the spy business more efficient. Read More

Criminals on Tor is the price of global liberty
Research pointing to rising criminality on Tor shows the cost of having a network that provides anonymity to whistleblowers, journalists, political dissidents and others trying to avoid government surveillance. Read More

If you haven't retired Windows XP and haven't been fired yet, get busy
CIOs who haven't moved their companies from Windows XP by now ought to be fired, some people think, but those who haven't and are still on the job have options for saving their bacon. Read More


WHITE PAPER: Attachmate

A Business-Driven Approach to Legacy Modernization
Learn how to get rapid service enablement via small, orchestrated steps. This paper discusses both new and traditional approaches to legacy modernization, while highlighting a service-enablement strategy that's fast and practical, with notable ROI potential. Learn More.

Android malware detection boosted by university research
With smartphones and tablets increasingly at risk from malware, researchers from North Carolina State University have devised a new and potentially better way to detect it on Android devices. Read More

Report: Half of all exploits target Java
Once upon a time, Microsoft was the favorite target of malware developers. As Microsoft improved the defenses in its software, though, cybercrooks moved on to easier pickings. Adobe was a prime target for a while, but Adobe followed Microsoft's lead and made its software more secure as well. According to data from the 2014 IBM X-Force Threat Intelligence Quarterly Report, the favorite target is now Java. Read More

Patch Tuesday: Microsoft to address IE problems
Microsoft is issuing five security bulletins this month, two of them critical and affecting all versions of Internet Explorer as well as all versions of Windows from XP to 8/8.1. Read More

Trust issue looms large for tech companies capitalizing on personal data
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector. Read More


SLIDESHOWS

The 700MHZ spectrum: Who owns what?

700MHZ spectrum holdings, from T-Mobile to Verizon and AT&T to Echostar.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Extensive video of the HTC M8 leaks, HTC gets real mad

2. Apple reveals unprecedented details in iOS security

3. Stanford team tries for zippier Wi-Fi in crowded buildings

4. Crazy theories and global manhunts for Bitcoin's creator Satoshi Nakamoto

5. Skype-based malware shows how 'peculiar' malicious code can be

6. Cisco revamps enterprise product pricing

7. 15 things we hate about Java

8. 9 must-do's if you must stick with Windows XP

9. If you haven't retired Windows XP and haven't been fired yet, get busy

10. Linux Foundation to offer introductory Linux MOOC on edX


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: