Search This Blog

Friday, May 16, 2014

Hacking hotels, shells, cell phones, cars and more mischief coming to Black Hat

Google Apps users getting encrypted messaging that goes beyond Gmail | Target, The Gap and others form group to share cyberthreat data

Network World Security

Forward this to a Friend >>>


Hacking hotels, shells, cell phones, cars and more mischief coming to Black Hat
Black Hat USA posted an impressive "first batch" of briefings that will be presented at the Mandalay Bay Convention Center in Las Vegas on August 6 and 7. Here are a few that have already caught my eye. Read More


WHITE PAPER: McAfee

Streamlining Response and Reaction to Attacks
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting. View Now>>

WEBCAST: Sourcefire, now part of Cisco

Innovations that Protect Against Advanced Attackers
This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >>

Google Apps users getting encrypted messaging that goes beyond Gmail
Google is making available a service to allow its enterprise customers to send and receive encrypted e-mail to users of non-Google mail systems, including Yahoo and Microsoft Exchange. Read More

Target, The Gap and others form group to share cyberthreat data
Some of the biggest U.S. retailers have banded together to share information about cyberthreats, in a bid to avert breaches like that suffered by Target last holiday season. Read More


WHITE PAPER: Panduit Corp.

Cloud-Enabled Data Center Infrastructure
Cloud-Based Delivery of IT infrastructure and Applications is radically changing the way businesses buy and use technology. But the cloud won't deliver full value to providers and users unless close attention is paid to physical infrastructure in the cloud data center. Learn More

Online advertising poses significant security, privacy risks to users, US Senate report says
The current state of online advertising endangers the security and privacy of users and the U.S. Federal Trade Commission should force the industry to offer better protections through comprehensive regulation, the U.S. Senate said in a report. Read More

Amazon, AT&T, Snapchat rated among the least trustworthy with data, EFF finds
Amazon, Snapchat and AT&T rank among the least trustworthy technology companies when it comes to how they handle government data requests, according to a report from the Electronic Frontier Foundation. Read More


WEBCAST: VMware | IBM

Virtualization Infrastructure With IBM and Vmware
Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage aspects as well. Learn More

Brown HIV researchers make Dropbox secure with nCrypted Cloud
While workers have embraced consumer technology in the workplace with enthusiasm, those technologies have posed pesky problemsA for organizations that deal with sensitive personal information, especially universities. Read More

Hortonworks Buys Big Data Security Specialist, Will Donate IP to Apache
As more organizations put big data applications into production, questions about enterprise requirements such as security in Hadoop are taken on ever greater importance. Hortonworks, the vendor behind the Hortonworks Data Platform (HDP) distribution of Hadoop, moved to answer those questions today with the acquisition of data security specialist XA Secure. Read More

BYOD may be SOP, but it's still a headache for IT
Just because BYOD has become standard operating procedure in most workplaces doesn't mean the practice has stopped causing challenges for IT. Read More

7 cool free open source projects you need to check out
The free open source world continues to expand at a phenomenal pace. These are great "jumping off" points for developing products and technologies. Read More


SLIDESHOWS

10 nerdiest Linux gadgets

Of all the nerdy Linux gadgets out there, these take the cake.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. TechEd: Microsoft reveals new Office features available only in the cloud

2. 8 emerging tech titles -- grab 'em before they're hot

3. Cisco may be bouncing back, but can Chambers hold on?

4. New evidence that Microsoft is preparing a cloud-based Windows OS

5. Step-by-step guide to documenting your network

6. New NSA Chief expects attacks attempting to damage, destroy critical infrastructure

7. Upgrade to Samsung Galaxy S5? No thanks

8. Microsoft sticks to vow, leaves XP exposed to ongoing attacks

9. Juniper Networks goes 'Back to the Future'

10. Real reason behind California's kill-switch bill: Bieber


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: