Search This Blog

Wednesday, May 21, 2014

25 cool cloud, security & mobile startups to watch

Bell Labs offers $100,000 prize for game-changing information technology | Tech's top-paid CEOs

Network World Security

Forward this to a Friend >>>


25 cool cloud, security & mobile startups to watch
There's no scientific formula behind this list: It's just a bunch of new-ish, mainly enterprise-focused computing and networking companies that have launched, received fresh funding of late or otherwise popped onto my radar screen. Read More


WHITE PAPER: McAfee

Streamlining Response and Reaction to Attacks
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting. View Now>>

WEBCAST: Sourcefire, now part of Cisco

Innovations that Protect Against Advanced Attackers
This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >>

Bell Labs offers $100,000 prize for game-changing information technology
One of the iconic research facilities in the world - Bell Labs -- today said it would offer $100,00 in prizes for researchers that have innovative ideas that can alter the information and communications technology field by a factor of 10. If that sounds pretty wide open, it is, as the lab is looking for all manner of advanced ideas in areas from web applications, cloud services, cryptography, network... Read More

Tech's top-paid CEOs
Fifteen tech leaders made more than $14 million in 2013. Read More


WHITE PAPER: Mobiquity Inc.

Five Steps to Developing a Successful Mobile Strategy
Don't lose time and money with a "throw an app against a wall to see if sticks" approach to mobile. It won't work. You need a well-thought-out strategy to take full advantage of mobile. This white paper lays out the five important steps to a robust enterprise mobile strategy. Learn more.

Check Point builds seven-armed threat-intelligence sharing alliance
Check Point Software Technologies today announced an alliance with seven security firms to make use of their threat-intelligence feeds and fee data from those sources into Check Point security gateways to block attacks. Read More

Symantec tailors sharper small business security suite
Symantec's latest product, Norton Small Business, is perhaps the most well-rounded offering the company has inserted into its product array for small companies. Read More


WHITE PAPER: IBM

The Big Data Zoo—Taming the Beasts
According to Dr. Devlin's white paper "The Big Data Zoo—Taming the Beasts", data is still data, whether big or small. It needs to be managed effectively if organizations want to be gain value from it. Although big data may present special challenges for IT organizations, the principles of data management haven't changed. Learn More

Big Data Security Analytics Meets Identity and Access Management
While most enterprise organizations have SIEM installed, they now realize that these venerable security systems cannot address today's dangerous threat landscape alone. As a result, many are adding network forensics and big data analytics systems for capturing, processing, and analyzing a whole bunch of additional security data. Read More

BlackShades cybercops demonstrate improving global cooperation
The international raids that led to the arrests of nearly 100 people suspected of trading in the notorious BlackShades Trojan shows that countries are learning how to cooperate at a large scale in chasing cybercriminals, experts say. Read More

Hacker indictments against China's military unlikely to change anything
The U.S. government's decision to formally indict five members of the Chinese military on criminal hacking charges marks a significant escalation of what's been a war of words between both countries. Read More


SLIDESHOWS

Celebrating 25 years of Cisco Networkers

This year, Cisco recognizes the 25th anniversary of its Networkers user conference.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 17 fascinating facts about Apple's retail stores

2. Cisco's Chambers tells Obama that surveillance impacts technology sales

3. 15 most powerful OpenStack companies

4. Cisco will lead SDN and win IT, Chambers says

5. OpenStack: Still waiting for the users

6. Ex-Cisco CEO reflects, looks ahead on 25 years of Networkers

7. Huge demand for NSA-proof email: ProtonMail uses a month's server capacity in 3 days

8. Cisco's quarterly results suggest product transitions are kicking in

9. Celebrating 25 years of Cisco Networkers

10. Home routers: Broken windows to the world


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: