Search This Blog

Monday, May 05, 2014

Obama, Merkel say they're still working on surveillance understanding

NASA Space Network facing critical technical, cost challenges | Security admins and executives: We hardly talk anymore

Network World Security

Forward this to a Friend >>>


Obama, Merkel say they're still working on surveillance understanding
The U.S. and German governments remain far from an agreement on the appropriate level of surveillance by the U.S. National Security Agency on German residents, leaders of both countries said Friday. Read More


WHITE PAPER: McAfee

Get Proactive About Managing Security and Risk
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis. View Now>>

WHITE PAPER: McAfee

Streamlining Response and Reaction to Attacks
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting. View Now>>

NASA Space Network facing critical technical, cost challenges
The network used to secure connectivity between spacecraft operating in low Earth orbit, such as the International Space Station, Hubble Space Telescope and a variety of other commercial and government spacecraft, faces a number of technical and monetary challenges in the next few years. Read More

Security admins and executives: We hardly talk anymore
At this past years RSA Conference I was the moderator on a panel about "Security Metrics: What matters?" One of the participants was my friend Jody Brazil, President of Firemon. Jody referenced a new survey that Firemon had partnered with the Ponemon Institutue about security metrics and the interaction between security teams and executives. Read More


WHITE PAPER: 8x8, Inc

Unified Communications for the Mobile, Cloud-based World
The world is changing. Cloud, mobile and social technologies are transforming the way businesses work. Unified communications (UC) brings it all together. Learn why companies are moving to UC and hosted VoIP service to: - Increase enterprise collaboration & productivity - Improve organizational response times - Lower costs Learn more >>

The Internet of Things likely to drive an upheaval for security
The Internet of Things is likely to bring 'a major inflection point in security' sooner than you think. Read More

FTC told to disclose the data security standards it uses for breach enforcement
The FTC can be compelled to disclose details of the data security standards it uses to pursue enforcement action against companies that suffer data breaches. Read More


WHITE PAPER: Limelight Networks

7 Principles to Improve Web Site Availability
Users hate to wait so when your web site doesn't respond the way visitors expect, your business suffers. This guide offers strategies for scaling your web infrastructure to meet web availability and performance SLAs, enhancing both speed and performance (there is a difference), and delivering superior user experience on any device, in any location. Learn More

DDoS attack from Facebook possible, but unlikely
While recently shown as possible, using Facebook to launch a DDoS attack would mean ignoring more effective methods, experts say. Read More

Microsoft fixes IE zero-day flaw
Microsoft has issued a patch for an Internet Explorer zero-day flaw being actively exploited by malicious hackers and that was first identified Saturday . Read More

6 free network vulnerability scanners
Though you may know and follow basic security measures on your own when installing and managing your network and websites, you'll never be able to keep up with and catch all the vulnerabilities by yourself. Read More

Heartbleed prompts joint vendor effort to boost OpenSSL, security
Reeling from the Heartbleed security fiasco, major IT vendors including Microsoft, IBM, Intel, Google and Cisco are backing a Linux Foundation initiative designed to boost open source projects considered critical to the industry. Read More


SLIDESHOWS

Fave Raves: 33 tech pros share their favorite IT products

It takes many tools to keep IT systems running smoothly, and tech pros have their personal favorites. What made the cut?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. How Adobe Is Moving on From Flash to Embrace HTML5

2. 2014 technology industry graveyard

3. Florida commuter's illegal jammer blocked more than cell talkers

4. 6 free network vulnerability scanners

5. Unplugging the data center

6. Don't forget how close Microsoft came to losing Novell lawsuit

7. SDN start-up targets enterprise WAN complexity

8. Microsoft warns Internet Explorer 6 to 11 vulnerable to zero-day spotted in the wild

9. VMware outlines 'vision' for unified mobile security and management

10. 10 users IT hates to support


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: