Search This Blog

Thursday, March 06, 2014

US intelligence group wants software to decide who is trustworthy

  Inside Cisco's private cloud | CIOs Battle Worker Apathy Towards Lost or Stolen Mobile Phones

 
  Network World Security

Forward this to a Friend >>>


US intelligence group wants software to decide who is trustworthy
In the security business one can never have enough trust. And one government group now wants your help in developing a software program that could help decide who's trustworthy and who isn't. Read More
 


  In this Issue
WHITE PAPER: PC Connection | Cisco | Intel®

Overcoming the Security Challenges of the Cloud
PC Connection, in partnership with Cisco and Intel®, recently conducted a survey to learn how organizations are using the cloud. In this white paper, you'll learn what you can do to mitigate security concerns and make the most out of the cloud. View Now

Inside Cisco's private cloud
Do private clouds work? Read More
 

CIOs Battle Worker Apathy Towards Lost or Stolen Mobile Phones
  American workers don't get too worked up about lost or stolen mobile phones -- even if those phones contain company data. A large percentage think it's not their problem and don't change their security practices afterwards. Are CIOs partly to blame for not setting stricter and clearer mobile security policies? Read More
 


WHITE PAPER: IBM

Streamline Data Protection with Storage Manager
IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup and Restore, TSM is a far more comprehensive data-protection solution. Read Now

Android-based malware: the good, the bad and the ugly
When it comes to mobile devices, it's well known that malware writers like to target Android. But a threat report published today by security firm F-Secure puts in perspective why Android malware attacks often flop and why Android itself is no pushover. Read More
 

Withdrawal vulnerabilities enabled bitcoin theft from Flexcoin and Poloniex
Hackers found security weaknesses that allowed them to overdraw accounts with Flexcoin and Poloniex, two websites that facilitate bitcoin transactions, and exploited them to steal bitcoins from the two services. The attacks put Flexcoin out of business and cost Poloniex's users 12.3 percent of their bitcoins. Read More
 


WHITE PAPER: IBM

Pay-as-you-Grow Data Protection
IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions they need, and add new functionalities as they grow. Read Now

CIOs Must Look to Adaptive Security Systems in Face of Evolving Threats
Microsoft's government security expert warns that there's no such thing as perfect security, so systems must be able to adapt and respond to attacks on unforeseen vulnerabilities. Read More
 

12 terrific techie TED talks
The true meaning behind 404 pages, an optimistic George Orwell & more Read More
 

 

INSIDER
5 biggest mistakes of IT hiring managers
As IT hiring ramps up in 2014, many job market experts are predicting a tech talent shortage. And certainly among the hot skill sets – security, Big Data, .NET and Java developers, project managers, business analysts and anyone with cloud or mobile experience – you can expect to see some sort of talent war, says Matthew Ripaldi, senior vice-president at Modis, a global provider of IT staffing services. Read More

 

 

SLIDESHOWS

The 700MHZ spectrum: Who owns what?

700MHZ spectrum holdings, from T-Mobile to Verizon and AT&T to Echostar.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Major security flaw threatens Linux users

2. FIRST LOOK: Cisco Nexus 9000

3. 30 richest techies in the world

4. 9 must-do's if you must stick with Windows XP

5. A wish list for Windows 9

6. Best iPhone, iPad Business Apps for 2014

7. Attack campaign compromises 300,000 home routers, alters DNS settings

8. Survey: 11% of Americans think HTML is an STD, software is 'comfortable clothing'

9. 12 terrific techie TED talks

10. iOS 7.1 to ship any day now, says Gruber


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: