Search This Blog

Tuesday, July 15, 2014

The Firewall: Questions abound about its future role in cloud, mobile and SDN environments

Network World Security - Newsletter - networkworld.com
Secret, an app for posting anonymously, lets users tap into Facebook | 10 changes CEO Nadella wants from Microsoft workers

Network World Security

Forward this to a Friend >>>


The Firewall: Questions abound about its future role in cloud, mobile and SDN environments
It’s been 20 years since Check Point Software Technologies shipped its first enterprise network firewall, marking the beginning of a mass market for firewalls that has protected millions of networks across the world.Check Point’s FireWall-1, unveiled at NetWorld+Interop in 1994, wasn’t the first network firewall, of course. The firewall had begun taking shape with the rise of the Internet. Companies and universities throughout the 1980s and 90s saw the need to block unwanted IP traffic by creating a perimeter gateway barrier however they could. In that era, they sometimes “rolled their own” based on routers or other gear until vendors eventually came to their rescue with firewall products that spared them this unwanted labor.To read this article in full or to leave a comment, please click here Read More


RESOURCE COMPLIMENTS OF: Solutionary

Understanding the Threat Landscape is the First Step
The Solutionary SERT 2014 Q2 Threat Intelligence Report shows popular ISPs continue to host malware and the U.S. is the top malware hosting country. Research focuses on the exploitability of Heartbleed and the use of Web shells and Node.js. The report also provides trends and insight security practitioners need to understand their adversaries. Download the 2014 Q2 Threat Intelligence Report now to better understand where the attacks are coming from. Report provided by Solutionary, an NTT Group security company.

WHITE PAPER: McAfee

The Only Next Gen Firewall to Stop AETs
The risk of network security systems being compromised by AETs continues to grow as more and more cybercriminals actively exploit this vulnerability. The answer is to combine stream-based inspection with data normalization on multiple protocol layers. The risk of network security systems being compromised by AETs continues to grow as more and more cybercriminals actively exploit this vulnerability. The answer is to combine stream-based inspection with data normalization

Secret, an app for posting anonymously, lets users tap into Facebook
How can something be a secret if all your Facebook friends see it?Secret is a company that makes an app for iOS and Android to let users post messages “anonymously.” When new members sign up, the app asks for their email address—plus their phone number, which is optional—in order to help them find friends who are also using the service.From there, users can post messages, but with limited identifiable information attached to them, which may include their city, or whether the post was made by a “friend” or “friend of a friend.” Messages posted at the Secret site range wildly in nature, shifting from tiny tales of jilted lovers to whimsical musings on procrastination to cliched inspirational sayings.To read this article in full or to leave a comment, please click here Read More

10 changes CEO Nadella wants from Microsoft workers
Public criticism, looming layoffs say shape up or ship out. Read More


WHITE PAPER: Juniper Networks

Security in the Next-Generation Data Center
This white paper examines these trends, and it reveals the key capabilities that today's security teams require to effectively ensure that vital corporate assets remain secure, while at the same time optimizing access, cost, and administrative efficiency. View Now

New banking malware 'Kronos' advertised on underground forums
Its creators seek to establish the new threat as a premium commercial alternative to older Trojans like Zeus Read More

How to sign up for Microsoft's restored security alert email service
Restored mailing list functionality earlier this month, but still hides the sign-up form Read More


WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

Revamping your insider threat program
Think headlines about data theft and leakage have nothing to do with you? Think again. Many of these incidents have a common theme: Privileged access. It's your job to make sure your organization doesn't fall victim to the same fate by at the very least examining your existing insider threat program, and perhaps doing a major revamp.+ ALSO ON NETWORK WORLD 5 free software tools for greater privacy +Edward Snowden's theft and release of National Security Agency data, Army Private First Class Bradley Manning's disclosure of sensitive military documents to information distributor WikiLeaks and the shooting at the Washington Navy Yard by a credentialed IT subcontractor have given IT executives across industries pause to reconsider their security policies and procedures.To read this article in full or to leave a comment, please click here Read More

INSIDER
Cybersecurity fears drive SMBs to third-party payment services
Between 2010 and 2013, there was a 25 percent drop in small business processing online orders as traditional credit card merchants. Instead, they turned to third-party payment services, primarily due to concerns over cybersecurity and costs.To read this article in full or to leave a comment, please click here(Insider Story) Read More

LastPass discloses now-fixed vulnerabilities ahead of security conference
The company doesn't believe attackers exploited the flaws Read More


SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Windows Phone 8.1 and its first update could appear this week

2. Ubuntu 14.04: Is Canonical taking on too much?

3. 20 cool things you can do with a Raspberry Pi

4. The Firewall: Questions abound about its future role in cloud, mobile and SDN environments

5. Cisco singing a different ACI tune

6. Apple's most important iPhone upgrades over the years

7. Hero hacks: 14 Raspberry Pi projects primed for IT

8. Tech's top-paid CEOs

9. Y2K bug resurfaces and sends draft notices to 14,000 men born in the 1800s

10. NSA stores 80% of Americans' phone conversations, claims NSA whistleblower Binney


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: