Search This Blog

Monday, April 28, 2014

Google speeds up encrypted Web communications in Chrome on Android

Mozilla to strengthen SSL certificate verification in Firefox | How to selectively delete browser history

Network World Security

Forward this to a Friend >>>


Google speeds up encrypted Web communications in Chrome on Android
Google has added support for a new TLS cipher suite in its Chrome browser for Android that the company claims will provide better security and performance for encrypted communications on mobile devices. Read More


WHITE PAPER: Dell Software

Protect your organization while supporting mobility and BYOD
Check out this new white paper to learn how Dell Mobility Solutions for security can help protect your organization's information, systems and networks while simplifying administration and supporting employees with forward-thinking mobility initiatives for a range of devices and operating systems. Learn more

WEBCAST: Fortinet

Beyond the Hype. Real-world Testing of APT Solutions
This Fortinet webcast shares the NSS Labs findings from their group test results, including who's recommended and who isn't. Learn more >>

Mozilla to strengthen SSL certificate verification in Firefox
Mozilla plans to more strictly enforce industry best practices for SSL certificates in future versions of Firefox with a new certificate verification system. Read More

How to selectively delete browser history
Rather than delete your entire browsing history after visiting a website you want to keep secret, there's an easy way to remove individual sites. Read More


WHITE PAPER: Alert Logic and PEER 1 Hosting

Defense Throughout the Vulnerability Life Cycle
This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle. Learn More

Linux Foundation responds to Heartbleed with Core Infrastructure Initiative
The Core Infrastructure Initiative (CII) is the software industry's response to the Heartbleed vulnerability. Read More

CIOs Face BYOD Hard Reality: Employees Don't Care
Firing a worker for not reporting a lost or stolen tablet or smartphone may seem extreme, but at some companies things have come to that. How can CIOs get workers to take BYOD policies seriously? Read More


WHITE PAPER: Sophos, Inc.

Advanced Persistent Threats: Detection and Protection
In this paper we'll explain how a multi-faceted approach to protect against APTs including layers of defense can reduce the risk of attacks. Learn More

Outrage over net neutrality decision heard 'round the Internet
The Federal Communications Commission's proposed new rules for net neutrality touched off a firestorm across broad sections of the Internet this week, as critics charge that the FCC has effectively gutted the entire concept. Read More

Enterprises Need Outside-In Continuous Monitoring for Risk Management
Ask any CISO what their job entails and they are likely to respond with a common mantra: Assess IT risk, communicate IT risk to business executives, and then create and execute a mutually agreed upon plan to address risk. In the past, CISOs concentrated this effort on internal IT but this internal focus is becoming increasingly myopic because: 1. Outsiders have network access. Enterprises... Read More


SLIDESHOWS

10 Big Data startups to watch

These 10 startups to watch were chosen based on third-party validation, experience, and market potential.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Whatever happened to the IPv4 address crisis?

2. California bill proposes mandatory kill-switch on phones and tablets in 2015

3. ATM malware, controlled by a text message, spews cash

4. 16 weirdest places you'll find Linux

5. 28 facts about pi that you probably didn't know

6. 12 free cloud storage options

7. Top 20 colleges for computer science majors, based on earning potential

8. 8 free Wi-Fi stumbling and surveying tools

9. IRS misses XP deadline, pays Microsoft millions for patches

10. How to change Windows 8.1 to local account with no Microsoft email account required


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: