Search This Blog

Friday, May 09, 2014

Tick, tock: Windows 8.1 users face patch ban as Microsoft sets next week's updates

FireEye buys nPulse to see deeper into the network | The Emerging Cybersecurity Software Architecture

Network World Security

Forward this to a Friend >>>


Tick, tock: Windows 8.1 users face patch ban as Microsoft sets next week's updates
Microsoft will issue eight security updates to customers next week that will include fixes for Internet Explorer, Windows, Office and SharePoint. Read More


WHITE PAPER: McAfee

Get Proactive About Managing Security and Risk
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis. View Now>>

WHITE PAPER: McAfee

Streamlining Response and Reaction to Attacks
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting. View Now>>

FireEye buys nPulse to see deeper into the network
The combination of Mandiant and nPulse, along with its own technology, gives FireEye a broad security framework now that can gather and analyze data from the core of the network to the hand of a user. Read More

The Emerging Cybersecurity Software Architecture
FireEye, IBM, and Symantec announcements move the industry in this inevitable direction. Read More

Quick look: America's first spaceport
Virgin Galactic, SpaceX and others expect the site to be the hub of commercial space operations Read More


WHITE PAPER: Dell and Intel

The Dell Advantage: What You Don't Know about Dell
These "fast facts" demonstrate Dell's industry leadership, unique design philosophy, and #1 positions in cloud, virtualization, iSCSI and enterprise support, find out how Dell is helping its customers get more from their technology. Learn more!

Check Point: 'Unknown malware' hits enterprise nets 53 times a day
Companies were getting hit on average with "unknown malware" around 53 times a day in 2013, according to Check Point's annual analysis of threat data collected from about a thousand enterprise customers. Check Point defines 'unknown malware" as malicious code that exploits a known vulnerability or weakness, but can't be detected at the time of its discovery by up-to-date anti-virus or intrusion-prevention systems. Read More

Top 12 tech hoaxes of all time
Social media pranks and viral videos have nothing on these truly historical technical hoaxes Read More

Heartbleed was a headache, but far from fatal
It's been a month since the Heartbleed Bug set off a stampede to patch software in everything from network gear to security software as it quickly became evident that vulnerable versions of the OpenSSL encryption code had been very widely deployed. Read More


WEBCAST: Sourcefire, now part of Cisco

Innovations that Protect Against Advanced Attackers
This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >>

IT malpractice: Doc operates on server, costs hospitals $4.8M
An inadvertent data leak that stemmed from a physician's attempt to reconfigure a server cost New York Presbyterian Hospital and Columbia University Medical Center $4.8 million to settle with the U.S. Department of Health and Human Services. Read More

New buys for EMC may come in security, big data
EMC may be in the market for security and data analytics acquisitions as it builds out what it calls a federation of businesses among VMware, RSA Security, Pivotal and the company's traditional storage operations. Read More

Unisys unveils invisibility cloak for network traffic
If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount. Read More


SLIDESHOWS

7 cool free open source projects you need to check out

The free open source world continues to expand at a phenomenal pace.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Worst of DRM set to infest physical law school casebooks

2. 10 nerdiest Linux gadgets

3. 7 in 10 office workers barely use Microsoft Office anymore

4. Inside United Airlines' nerve center

5. Microsoft calls out malicious downloaders

6. The day the AV died

7. Adobe Voice video app focuses on narration

8. FBI: "Sky was the limit" for this now jailed scammer

9. Will Wave 2 of 802.11ac minimize Ruckus Wireless' advantage?

10. Is that Twitter account a bot? Researchers make app to find out


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: