Search This Blog

Wednesday, April 02, 2014

Google trumpets extra encryption for Gmail, but stays mum on other apps

To Automate or Not to Automate (Incident Response): That Is the Question | The (mostly) cool history of the IBM mainframe

Network World Security

Forward this to a Friend >>>


Google trumpets extra encryption for Gmail, but stays mum on other apps
Google recently trumpeted that it now encrypts Gmail messages while shuffling them among its data centers, an extra security layer aimed at thwarting government and criminal snoops, but didn't say if it applies this protection to its other applications. Read More


RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference

FINAL DAYS to Register: CSO40 Security Confab + Awards
Please join us this March 31 – April 2, 2014 for CSO40 Security Confab + Awards. Our program of fast-moving, rapid fire presentations delivered by leading CSO and CISO thought leaders demonstrate how forward-thinking organizations are embracing today's challenges and preparing for the future. Register now.

WEBCAST: IBM

Evolving Your Integration Strategy to Extend Beyond IT
These days, integration is no longer optional, but this ubiquity can hide the massive and rapid change which integration is undergoing. In the next few years, we will see new approaches to integration being adopted by central IT and lines of business, increasing demand for more agile and hybrid deployments, and analytics and API networks. Learn More

To Automate or Not to Automate (Incident Response): That Is the Question
Read More

The (mostly) cool history of the IBM mainframe
IBM's iconic mainframe turns 50 Read More

Hacked passwords can enable remote unlocking, tracking of Tesla cars
Tesla Motors accounts are protected only by simple passwords, making it easy for hackers to potentially track and unlock cars, according to a security researcher. Read More


WHITE PAPER: Intigua

Systems Management Virtualization
Discover how virtualizing the management layer, by de-coupling agents from the underlying server infrastructure, eliminates the need to install physical agents on servers and makes ongoing management tasks such as provisioning and updating agents as simple as copying a single "virtual agent" file to all required servers. Read more. Learn More

Hot products at Interop
These products are on display at the annual tech conference in Vegas. Read More

China's unsupported XP machines hold the potential to become a massive botnet army
Unsupported Windows XP machines in China could pose a threat to the Internet in general if bot-herders round up significant numbers of them to use as launch pads for malicious exploits, according to a top white-hat hacker. Read More

5 Ways to Prevent Data Loss in Mobile Environments
Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data loss on mobile devices. Read More


WHITE PAPER: CDW

The value of smarter oil and gas fields
With global energy requirements continuing to rise, the exploration, development and production of new oil and gas resources are shifting to increasingly challenging sites. Meanwhile, regulations continue to tighten worldwide. Finding and keeping experienced personnel is only getting harder. View Now

16 terrible computer pranks that could get you fired
Look, you're an adult human being. You're better than this. Don't do any of the things in this slideshow. Read More

20 infamous hacker security vendor break-ins
Here are 20 of the most notorious known break-ins over the past decade. Read More

Top 10 Recession-Proof IT Jobs
Just as no person is indispensable, no role in IT is recession-proof. However, with a little forethought, some planning and the desire to learn, you can find an IT role that promises a bright future. Read More


SLIDESHOWS

Hot products at Interop

These products are on display at the annual tech conference in Vegas.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Forget physical access: Remote USB attacks can blue screen Windows servers

2. 16 terrible computer pranks that could get you fired

3. Microsoft slashes Azure prices, introduces new basic tier

4. Emails detail Google's battle to stop Facebook from poaching its employees

5. Cisco challenger Arista files to go public

6. Fun things to do in Vegas after the trade show

7. 7 Hot IT Jobs That Will Land You a Higher Salary

8. SDN changing the shape of networking, IT careers

9. China's unsupported XP machines hold the potential to become a massive botnet army

10. Smartphone kill-switch could save consumers $2.6B per year, says report


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: