Search This Blog

Friday, December 12, 2014

The POODLE flaw returns, this time hitting TLS security protocol

  Notable deaths of 2014 from the worlds of technology, science & inventions | Why disaster recovery planning can save lives

 
  Network World Compliance  

The POODLE flaw returns, this time hitting TLS security protocol
HTTPS website owners advised to check their websites again Read More
 


WHITE PAPER: Nexsan Technologies

Hybrid Approach Rewrites The Rules For Backup Storage
Exponential data growth and long-term retention requirements are putting tremendous pressure on IT professionals, and the constant pressure to reduce storage costs has led many IT departments to settle for the status quo when it comes to protecting their data. View more

In this Issue


WHITE PAPER: IBM

Improving the Management and Governance of Unstructured Data
Maximize efficiency with deeper insight to data value and automated, policy-based compliance, retention & disposition. Read Now

Notable deaths of 2014 from the worlds of technology, science & inventions
In memoriam: We mourn the passing of IDG and MIT's own Patrick McGovern, and other industry influencers. Read More
 

 

INSIDER
Why disaster recovery planning can save lives
From Katrina to Sandy, tornadoes in the planes, flooding in the south, wildfires throughout the West, natural disasters threaten our world with destruction every year. The cost to rebuild and recover is phenomenal, so companies across the globe are investing in disaster recovery solutions to mitigate their losses and protect their data from these cataclysmic events.To read this article in full or to leave a comment, please click here(Insider Story) Read More
 

 

Pew poll: Limited knowledge on privacy policies, more on net neutrality
About six in 10 US Internet users were able to correctly define net neutrality in a survey Read More
 

Cisco buying Neohapsis to boost security services
Cisco said Wednesday it is planning to buy Neohapsis, a security consulting firm that evaluates corporate security, risk and compliance, as part of its push into security as a service. After the deal goes through sometime next spring, Cisco says Neohapsis will be part of its Security Services group and its partner network that was announced in September 2013. Cisco didn't say how much it is paying. + Also on Network World: Cisco lawsuits aside, Arista forges ahead with EOS |Why January could be a big month for Windows 10 +To read this article in full or to leave a comment, please click here Read More
 

Hitachi finger vein scanner could secure large venues
A "walkthrough-stye" scanner would require a simple wave of the hand to open gates Read More
 


WHITE PAPER: IBM

Quintillion Case Study
Hedge fund administration company Quintillion doubles its asset and investor portfolio while keeping staff levels almost flat, by working with Insight 2 Value to deploy an efficient content management solution, based on IBM Case Manager. Read Now

Hackers demand Sony pulls plug on 'The Interview'
A posting on an Internet forum links the Sony Pictures hack to North Korea Read More
 

US court extends NSA surveillance rules in current form
A reform bill, USA Freedom Act, ran into difficulties in the Senate Read More
 

FIRST LOOK: IBM and Apple's new enterprise apps for iOS
Getting work doneApple and IBM announced a suite of powerful new business-focused mobile apps for iOS this week. While that shouldn't really surprise anybody – smartphones and tablets have become increasingly central to the business world over the past few years – these apps have taken the possibilities a lot further than simply having email and a GPS in an employee's pocket. Have a look.To read this article in full or to leave a comment, please click here Read More
 

US Senator introduces bill to block FBI backdoor access
Senator Ron Wyden's bill aims to prevent government-forced backdoors and security vulnerabilities Read More
 

Microsoft Patch Tuesday addresses Exchange and Explorer flaws
Microsoft issued 7 security patches for the month Read More
 


WEBCAST: APC by Schneider Electric

Building Tomorrow's Data Center with Converged Technologies
A number of forces are converging: the cloud, converged infrastructure, big data and fabric architectures to name a few. And if those weren't enough, data center professionals must keep systems up 24 by 7, keep data secure, meet compliance obligations and keep costs and energy usage under control. It's a tall order. Learn More

Over 30 vulnerabilities found in Google App Engine
  Researchers escaped the Java sandbox on the cloud platform and executed code on the underlying system Read More
 

Top 10 Tech stories 2014: Backlash! Disrupting the disruptors
Top stories include Uber's bumpy ascendancy, HP's breakup, Regin malware, Nadella taking reins at Microsoft and Alibaba IPO Read More
 

Bebe Stores says credit card data hacked
The retail chain becomes the latest to suffer theft of customer payment card information Read More
 

Weird science: The 10 oddest tech stories of 2014
Weird science: The 10 oddest tech stories of 2014 Image by hitchBOTEvery now and again, strange events from the world of high tech bubble over to the general news cycle and make headlines for a day or two. No doubt these crossover hits favor reports that enforce the general populace's sentiment that technologists are fringe lunatics with their eyes on our collective future demise. This phenomenon has become more common in recent years as the intersections of technology and pop culture have become busier and more crowded. In 2014, plenty of technology weirdness cycled through the "odd news" section of mainstream media outlets. But for the real connoisseur of weird tech news, there's a very specific sweet spot.To read this article in full or to leave a comment, please click here Read More
 

New products of the week 12.08.2014
Our roundup of intriguing new products from companies such as Microsoft and Watchguard Technologies Read More
 

 

SLIDESHOWS

Cisco's top 10 innovations over the years

A look back at Cisco's most innovative moves in its 30 years in the industry.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco buying Neohapsis to boost security services

2. The POODLE flaw returns, this time hitting TLS security protocol

3. 11 technologies Apple has killed

4. Apple iOS 8.1.2 for iPhone, iPad addresses disappearing ringtones mystery

5. VCs bet $33M you'll want to use Avi Networks' white box hardware for app delivery

6. Patch Tuesday Dec 2014: 7 fixes, 3 critical patches for Windows, IE and Office

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. 15 essential open source tools for Windows admins

9. 5 information security trends that will dominate 2015

10. What happens next in the Cisco suit against Arista


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: