Search This Blog

Tuesday, May 20, 2014

Huge demand for NSA-proof email: ProtonMail uses a month's server capacity in 3 days

Cisco's Chambers tells Obama that surveillance impacts technology sales | BlackShades users targeted in 16-country law enforcement action

Network World Security

Forward this to a Friend >>>


Huge demand for NSA-proof email: ProtonMail uses a month's server capacity in 3 days
There's a huge demand for private and secure email that is as easy to use as Gmail or Outlook, just ask the Harvard and MIT students who created a Swiss-based end-to-end encrypted email service called ProtonMail. Read More


WHITE PAPER: McAfee

Streamlining Response and Reaction to Attacks
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting. View Now>>

WEBCAST: Sourcefire, now part of Cisco

Innovations that Protect Against Advanced Attackers
This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >>

Cisco's Chambers tells Obama that surveillance impacts technology sales
Cisco Systems' CEO John Chambers has written to U.S. President Barack Obama, asking for his intervention so that U.S. technology sales are not affected by a loss in trust as a result of reports of surveillance by the U.S. National Security Agency. Read More

BlackShades users targeted in 16-country law enforcement action
Law enforcement agencies from 16 countries on three continents last week arrested 97 people after executing raids targeting those suspected of creating, buying and using a notorious Trojan program called BlackShades. Read More


WHITE PAPER: IBM

The Big Data Zoo—Taming the Beasts
According to Dr. Devlin's white paper "The Big Data Zoo—Taming the Beasts", data is still data, whether big or small. It needs to be managed effectively if organizations want to be gain value from it. Although big data may present special challenges for IT organizations, the principles of data management haven't changed. Learn More

Big Data Security Analytics Meets Identity and Access Management
While most enterprise organizations have SIEM installed, they now realize that these venerable security systems cannot address today's dangerous threat landscape alone. As a result, many are adding network forensics and big data analytics systems for capturing, processing, and analyzing a whole bunch of additional security data. Read More

Celebrating 25 years of Cisco Networkers
This year, Cisco recognizes the 25th anniversary of its Networkers user conference. To put this run in perspective, here's a timeline of Cisco-specific events interspersed with world, national, cultural and technology milestones that occurred over this period. Read More


: RES Software

Intuit Turns to Self-Service IT
Intuit empowered its users to resolve their own IT issues with a consumer-like experience to free IT to focus on more strategic initiatives. See how Intuit got here Learn more

U.S. to formally accuse Chinese military of hacking
U.S. officials later today will charge several individuals connected to China's military with hacking American firms, online reports said early Monday. Read More

15 most powerful OpenStack companies
OpenStack at its core is an open source project - it's free code. But what makes OpenStack come alive are the vendors that have contributed to make that raw code and then turned it into a product businesses can use. Read More

Why IT needs to drive the risk conversation
It's a familiar complaint: Executives from a business department learn about a new, often cloud-based product and they want to try it. Only they can't, because IT has decreed that this wonderful new product creates too much risk. The frustrated business execs gripe that IT is standing in the way of progress. As one business executive said, IT is "where dreams go to die." Read More


SLIDESHOWS

Celebrating 25 years of Cisco Networkers

This year, Cisco recognizes the 25th anniversary of its Networkers user conference.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. More fake antivirus programs found in Google Play, Windows Phone Store

2. Why Adobe's Creative Cloud is a really, really bad idea for the sheeple

3. Cisco's Chambers tells Obama that surveillance impacts technology sales

4. 15 most powerful OpenStack companies

5. Celebrating 25 years of Cisco Networkers

6. Cisco may be bouncing back, but can Chambers hold on?

7. Cisco offers an ACI migration path

8. iPhone 6 rumor rollup for the week ending May 16

9. OpenStack: Still waiting for the users

10. Ex-Cisco CEO reflects, looks ahead on 25 years of Networkers


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: