Search This Blog

Friday, November 21, 2014

Activists release Detekt tool that finds surveillance malware

7 commonly overlooked ways to tighten cybersecurity | SDN in action: Hands-on with Cumulus Linux

Network World Compliance

Activists release Detekt tool that finds surveillance malware
The tool is a joint project of multiple privacy groups who investigated malware used to target journalists and human rights activists Read More


WHITE PAPER: Binary Tree

Merger Integration: Diverse Organizations Collaborate as One
Corporate email and related applications are often overlooked during an impending integration of dissimilar environments, or a separation into multiple ones. Several key factors enable an organization to collaborate as one team, quickly and robustly, while maintaining user productivity. Learn More

In this Issue


WHITE PAPER: Binary Tree

SMART: Best Practices for Migrating the Corporate Directory
A cornerstone of any IT infrastructure, Microsoft Active Directory plays a central role, determining access to and usage rights for IT resources. Migrating AD to a new environment must be planned and managed carefully using best practices, while maintaining operations and user functionality. Learn More

7 commonly overlooked ways to tighten cybersecurity
It's OK to be paranoid about every last detail when it comes to security. Read More

INSIDER
SDN in action: Hands-on with Cumulus Linux
The stage is set for SDN (software-defined networking) to change the way we push data through our infrastructures, with the promises of more agile network provisioning and management, as well as more affordable network hardware. But for many, the SDN concept is still amorphous. What does SDN look like in practice? To read this article in full or to leave a comment, please click here(Insider Story) Read More

20-plus eye-popping Black Friday 2014 tech deals
iPhone 6, iPad Air, Samsung Galaxy gear and big cheap TVs among the hottest electronic deals for Black Friday and Cyber Monday in 2014. Read More

New ransomware CoinVault allows users to decrypt one file for free
Cybercriminals use freebie tactic in attempt to increase ransomware success rate Read More

EFF, Mozilla back new certificate authority that will offer free SSL certificates
The new CA is called Let's Encrypt and its goal is to encourage the widespread adoption of SSL/TLS on the Internet Read More


WHITE PAPER: Kaseya

5 Ways to Reduce the Risk of Cybercrime to Your Business
Cybercrime is on the rise. In fact, the risks and costs of cybercrime continue to increase each year. Don't be one of the many organizations naively clinging to the belief that a breach won't happen to them. As an IT professional, you need to take active steps to reduce the risk of cybercrime to your business. Reduce your risk today. Learn more

The 10 mightiest supercomputers on the planet
China retains top spot for fourth consecutive Top500 list Read More

Obama backs passing of NSA reform legislation by Senate
U.S. President Barack Obama wants to sign the bill this year Read More

This is how Google is dealing with 'right to be forgotten' requests
We will hear next week what the EU data protection authorities think of Google's methods Read More

Sonatype aims to help developers reduce risk from open-source components
The Sonatype Component Lifecycle Management 2.0 tracks vulnerable third-party components used in software Read More

US putting fake cell towers in planes to spy on people, report says
The so-called "dirtboxes" are used to locate criminals Read More


WHITE PAPER: NetBrain Technologies

Applying Automation to Maintain Accurate Network Diagrams
Accurate network diagrams are the Holy Grail in enterprise network management – most network teams know they should be documenting their networks but haven't found a universally good way of doing it. Learn More

New products of the week 11.17.2014
Our roundup of intriguing new products from companies such as F5 Networks and Dell Read More

USB Armory is the Swiss army knife of security devices
A USB-stick computer built around a processor with strong security capabilities Read More

Long-running Android botnet evolves, could pose threat to corporate networks
The 'NotCompatible' Android Trojan now uses peer-to-peer encrypted communication, researchers from Lookout said Read More

BitTorrent dismisses security concerns raised about its Sync app
The cryptographic implementation is solid and cannot be compromsied through a remote server, the company said Read More

15 can't-miss products at DEMO Fall 2014
Startups flock to DEMO with stand-out products. Read More

Cool Yule Tools: Best techie gifts for 2014
The National Santa Agency has a handle on what everyone wants. Read More


SLIDESHOWS

Pi, translated: The evolution of Raspberry Pi

It's only been two years, but the Raspberry Pi has already come a long way.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES of 2014

1. Peeping into 73,000 unsecured security cameras thanks to default passwords

2. Google Internet balloon drops in on farmer

3. How does a Windows bug go undetected for 19 years

4. 20-plus eye-popping Black Friday 2014 tech deals

5. Gartner's cloud showdown: Amazon Web Services vs. Microsoft Azure

6. New cruise ship a floating heaven for tech geeks

7. Ransomware: City of Detroit didn't pay, TN sheriff's office did pay to decrypt

8. Tech's new blue collar: Good-paying jobs that don't require a 4-year degree

9. FTC gets federal court to shut down $120M tech support scam

10. SDN in action: Hands-on with Cumulus Linux


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: