Search This Blog

Friday, January 09, 2015

CheckPoint, Watchguard earn top spots in UTM shootout

Best of CES 2015: In pictures | Apple blocks tool that brute-forces iCloud passwords

Network World Compliance

INSIDER
CheckPoint, Watchguard earn top spots in UTM shootout
When it comes to unified threat management appliances aimed at the SMB market, vendors are finding a way to fit additional security features into smaller and more powerful appliances.To read this article in full or to leave a comment, please click here(Insider Story) Read More


WHITE PAPER: Dell Software

Anatomy Of A CyberAttack
Do you know how to keep cyber-criminals out of your network? Cyber-criminals employ complex techniques to avoid detection as they sneak into corporate networks to steal intellectual property. Don't give the bad guys the keys to your network. Learn how to protect your organization from emerging threats in our e-book. Read Now

WHITE PAPER: Worksoft, Inc.

IDC Reports the ROI of Automated Business Process Validation
Industry analyst firm IDC examines the value proposition driving large SAP® customers to adopt automation as their new standard in quality assurance. The study quantifies ROI at 12 of the world's largest companies using Worksoft business process validation software, with benefits worth $4.2 million annually and a five year NPV of $11 million. Learn More

Best of CES 2015: In pictures
The best and most noteworthy products and technologies found at CES 2015. Read More

Apple blocks tool that brute-forces iCloud passwords
The tool allowed attackers to try a large number of passwords for Apple ID accounts Read More

Moonpig jeopardizes data of millions of customers through insecure API
The company failed to fix a security flaw reported over a year ago, a developer said Read More


WEBCAST: RSA

Preventing Data Breaches with Data Access Governance
Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach. Learn More>>

Gogo inspects secure Web traffic in attempt to limit in-flight video streaming
In-flight Internet provider Gogo replaces the HTTPS certificates on sites like YouTube with self-signed ones Read More

Tor warns of possible disruption of network through server seizures
Tor did not name the group that it expects may seize its specialized servers called directory authorities Read More

Macro-based malware is making a comeback, researchers warn
Attackers bypass defenses aganst macros with social engineering to install malware Read More


WHITE PAPER: Bitdefender

Secure Virtual Infrastructure Without Impacting Performance
Implementing traditional security solutions in virtualized environments can quickly lead to performance degradation. Download this whitepaper to learn how to build a security solution built specifically for virtual environments. Secure your infrastructure, improve performance, and lower costs. Learn More

Videos: CES 2015 has it all from wearables to laptops
Take a look at the sights and sounds from the annual consumer show in Las Vegas. Read More

INSIDER
How an acute shortage of cyber talent gave rise to 'spooks as a service'
At the RSA Security Conference last year, companies large and small were trumpeting the spy agency connections of senior staff as never before. Startups in areas like 'threat intelligence' and endpoint protection touted their executives' experience at three-letter agencies as a precursor to conversations about the scourge of advanced threats and attacks.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Worst customer data breaches of 2014
The Sony breach is making headlines, but this type of corporate espionage doesn't directly harm consumers. Read More


SLIDESHOWS

The "Future" is now (well, in October)

15 things Back to the Future II got right (and horribly wrong).

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Former Microsoft Chief Privacy Officer on the Cloud Conspiracy

2. Why SDN all-stars are heading to Brocade

3. Hawkeye G battles malware so you don't have to

4. Will enhanced servers do away with need for switches?

5. 15 job titles getting big salary boosts in 2015

6. Best of CES 2015: In pictures

7. Quiz: Name the Linux distro

8. Peeping into 73,000 unsecured security cameras thanks to default passwords

9. 10 CES 2015 ShowStoppers

10. Six social engineering tricks that can be avoided if you're careful


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: