Search This Blog

Monday, June 09, 2014

Critical flaw in encryption has been in OpenSSL code for over 15 years

A new approach in luring top tech talent: a streamlined hiring process | Advanced prevention: Nothing new, just better

Network World Security

Forward this to a Friend >>>


Critical flaw in encryption has been in OpenSSL code for over 15 years
Read More


WHITE PAPER: Network Instruments

4 Key Survival Tips for Planning Your Next Big Data Project
Big Data projects slam network performance. This paper offer survival tips to prepare your network before the Big Data projects hit, not after. Learn how to monitor and manage network performance for bandwidth, consistent low latency, scalable storage, processing power and security. Learn More

WEBCAST: Dell SecureWorks

What Can Security Leaders Do to Combat Cyber Threats?
Training employees to understand the risk they create for your organization when they don't consider security in their day-to-day activities is a challenge for most IT and IT security organizations. Changing behavior is always difficult, especially when security awareness programs lack a well-defined approach and dedicated resources. I Learn more

A new approach in luring top tech talent: a streamlined hiring process
Partnering with human resources can help IT managers find better qualified candidates Read More

Advanced prevention: Nothing new, just better
Enterprise organizations should selectively bolster defenses based upon threat intelligence and industry trends. Read More

CloudPassage adds important security functions to virtualized environments
Borrowing a paradigm from botnets, CloudPassage puts a small agent on virtualized servers so they can accept command-and-control communications to add important security functions. This security automation platform can instantly add firewalls, configuration monitoring, event logging and more to virtual servers that come and go in an elastic compute environment. Read More


WHITE PAPER: BMC Software

Deliver Better Service and Support, More Efficiently
People and businesses can do amazing things when technology runs at its best. Changing requirements and expectations have placed new demands on IT; now it's time for a new approach to service and support. Learn More

Report defines barriers, calls for more research in bringing drones into US airspace
Technical, regulatory and social issues must be overcome if unmanned aircraft are to be successfully integrated into US public airspace. Those were the main conclusions in a report issued this week by the National Research Council. The 92-page report that identifies key barriers and provides research recommendations that could help answer the serious questions about how drones will be safely and efficiently integrated into the existing civil aviation structure. +More on Network World: NASA lurches toward 2014 unmanned aircraft competition; Air Force wants technology that will let drones sense and avoid other aircraft+To read this article in full or to leave a comment, please click here Read More

Symantec rolls out threat-intelligence sharing with Cisco, Check Point, Palo Alto Networks
Managed security services customers get new data but have to decide whether to apply it Read More

Malicious advertisements on major websites lead to ransomware
Cisco said the attacks can be traced to advertisements on Disney, Facebook and The Guardian newspaper Read More


WHITE PAPER: Damballa

Big Data Helps Defend Against Breaches
The prolific number of advanced threats makes it impossible for security teams to keep up. Automating detection and response is necessary to stay ahead of attackers. Big data analytics is a future-proof foundation for outlasting the cyber security malware arms race Read More

How do mobile location services threaten users?
GAO report says rules governing use of location data need to get tougher Read More

The Snowden leaks: A timeline
What started with a sensational story on June 5, 2013 quickly turned into an unprecedented expose of U.S. intelligence operations Read More

How high-performing IT departments affect their companies' bottom line
Read More


SLIDESHOWS

15 more weird things in the Internet of Things

The Internet of Things is growing, and the things are getting weirder by the day.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. What's the best approach to building next-generation data center networks?

2. Intel confronts a big mobile challenge: Native compatibility

3. Microsoft partners "pissed" about pact with Salesforce

4. Verizon threatens to sue Netflix in war of words over video quality

5. Critical flaw in encryption has been in OpenSSL code for over 15 years

6. 11 common phrases and terms that came from obsolete technology

7. TrueCrypt's abrupt demise 'puzzling, bizarre'

8. Juniper wires up WLAN deal with Aruba

9. New OpenSSL vulnerability called not as serious as Heartbleed

10. 9 new iOS features from Apple's WWDC that Android already had


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: