Search This Blog

Thursday, May 15, 2014

New NSA Chief expects attacks attempting to damage, destroy critical infrastructure

Federal car fleet to become test bed for high-tech safety gear | "Game of Thrones" author likes DOS, hates spellcheck

Network World Security

Forward this to a Friend >>>


New NSA Chief expects attacks attempting to damage, destroy critical infrastructure
Were you hoping a new NSA director might help turn the tide in a way that would be good for privacy? If his early comments are any indication, then you'll likely be disappointed. In his first interview since taking over at the NSA and U.S. Read More


WHITE PAPER: McAfee

Get Proactive About Managing Security and Risk
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis. View Now>>

WHITE PAPER: McAfee

Streamlining Response and Reaction to Attacks
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting. View Now>>

Federal car fleet to become test bed for high-tech safety gear
Future autos leased by the federal government will be equipped with some advanced high-tech safety technology in an effort to test the equipment in real-life situations. The General Services Administration (GSA) and the Department of Transportation's National Highway Traffic Safety Administration (NHTSA) said they would team up on the program to further develop high-tech driver and vehicle safety technology.... Read More

"Game of Thrones" author likes DOS, hates spellcheck
Funny piece of an interview with George R. Martin on Conan last night. The "Game of Thrones" author was asked if he worries about computer virus' ruining his 1,000 page tomes. Martin's answer: He doesn't because he prefers to write on a DOS computer running WordStar 4.0. Well, who doesn't? Take a look: Read More


WEBCAST: Sourcefire, now part of Cisco

Innovations that Protect Against Advanced Attackers
This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >>

Microsoft's .NET Framework security updates further effort to phase out RC4 encryption
Microsoft released optional security updates Tuesday for various versions of the .NET Framework that prevent the RC4 encryption algorithm from being used in TLS (Transport Layer Security) connections. Read More

Adobe patches critical flaws in Reader, Acrobat, Flash Player and Illustrator
Adobe Systems released critical security updates for several products Tuesday in order to fix vulnerabilities that could allow attackers to take remote control of systems running the vulnerable software. Read More


WEBCAST: VMware | IBM

Virtualization Infrastructure With IBM and Vmware
Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage aspects as well. Learn More

8 emerging tech titles -- grab 'em before they're hot
With change the only constant in the IT jobs market these days, savvy tech pros are keeping their eye on these emerging specialties. Read More

Senator seeks answers on Samsung's fingerprint scanner for Galaxy S5
U.S. Sen. Al Franken questioned Samsung on the privacy protections the company has in place for the fingerprint scanning technology on its recently released Galaxy S5 smartphone. Read More

SanDisk ships its first self-encrypting SSDs
SanDisk today announced its SanDisk X300s SSD line-up, which uses TCG Opal 2.0 and Microsoft Encrypted Hard Drive hardware-based encryption, coupled with a new SSD administration dashboard. Read More

Security-vendor snake oil: 7 promises that don't deliver
Beware bold promises from a multibillion-dollar industry that can't prevent your IT systems from being routinely hacked Read More


SLIDESHOWS

10 nerdiest Linux gadgets

Of all the nerdy Linux gadgets out there, these take the cake.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. New evidence that Microsoft is preparing a cloud-based Windows OS

2. TechEd: Microsoft reveals new Office features available only in the cloud

3. Step-by-step guide to documenting your network

4. Quick look: What's hot with 3D printers?

5. Real reason behind California's kill-switch bill: Bieber

6. How Riverbed is reinventing itself

7. Gartner Tells IT Executives How to Enable Enterprise Collaboration

8. HP pivots, says open sourcing SDNs is right

9. Laid-off IBM workers allege age bias in lawsuit

10. Upgrade to Samsung Galaxy S5? No thanks


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: