Search This Blog

Friday, March 20, 2015

10 young security companies to watch in 2015

Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone | Top 11 oddball real-world tech job interview questions

Network World Compliance

10 young security companies to watch in 2015
A wealth of young security companies is trying to capitalize on businesses moving toward security platforms that help them respond more quickly when they suffer successful cyberattacks in hopes of limiting the damage they do. Read More


WHITE PAPER: VMTurbo, Inc.

Cloud: Delivering Performance in Shared Environments
This whitepaper explores how service providers use VMTurbo to provide consistent performance across all workloads, as well as the three roles a responsible managed service provider (MSP) takes in order to accomplish that directive. Learn More

In this Issue


WEBCAST: IBM

ING Transforms DevOps to Reduce Cost and Speed Delivery
ING, one of the largest banks in Europe needed to reduce the high cost of isolated, inefficient application development. They chose IBM PureApplication System to move their IT infrastructure to a cloud-based shared service model. In this Webcast, ING executive, Mark Willemse, shares the lessons ING learned from this strategic initiative. Learn more

INSIDER
Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone
Apple's iPhone and iPad long ago pushed out the BlackBerry as the corporate standard for mobile devices, in all but the highest-security environments. Google -- whose Android platform reigns outside the corporate world -- is now trying to push out Apple, with a new effort called Android for Work. And Samsung is upping the game with a new version of its own Android security suite, Knox.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Top 11 oddball real-world tech job interview questions
OddballAs if it isn’t already tough enough to land a job in tech, how would you like to be hit up with one of these strange interview questions? Some of the best, collected by online jobs/career marketplace Glassdoor. (10 More Oddball Job Interview Questions from 2014)To read this article in full or to leave a comment, please click here Read More

Meet the Tech Dude Who Doubles as the Weird Al of Drone Songs
A mild-mannered tech and media support coordinator for Oregon State University Extension Service by day, Victor Villegas takes on the persona of The Drone Singer during his off hours. Yes, he fashions himself as the Weird Al Yankovic of drone songs.Following the FAA’s recent launch of a well-intentioned but dull campaign to encourage safe flying of personal or commercial drones (a.k.a., unmanned aerial vehicles or unmanned aircraft systems), the 46-year-old Villegas released to YouTube “If You Get a Drone for Christmas,” his first drone-related parody song designed to get the safety message across in a catchier way.To read this article in full or to leave a comment, please click here Read More

INSIDER
Review: Aerospike kicks scale-out NoSQL into high gear
In this new world of scale-out, clustered NoSQL databases that process thousands -- even millions -- of transactions per second, good cache management is critical for good performance. Service I/O requests from RAM whenever you can; service I/O requests from spinning disks only when you must.To read this article in full or to leave a comment, please click here(Insider Story) Read More


WHITE PAPER: IBM

5 Fundamentals to Extract Maximum Value from the Cloud
This whitepaper identifies and explores the core foundational elements of a mature cloud strategy. As the basis of this research, The Economist Intelligence Unit solicited the views of eight leading experts, based on their real-world experience. Learn More

Researchers find same RSA encryption key used 28,000 times
Another look at the impact of the FREAK flaw has turned up some surprising findings Read More

7 Hot Career-related Companies to Watch
In among all the cloud, security and mobile tech startups attracting venture funding so far this year, new companies focused on hiring, education and career development are pulling in big bucks.By our count, based on our 2015 timeline of more than 3 dozen enterprise network & IT tech investments so far, nearly $300 million has been pledged to those companies essentially focused on building and improving the workforce -- and an increasingly technology-based workforce at that.MORE: Hottest Enterprise Network & Computing Startups of 2015To read this article in full or to leave a comment, please click here Read More

OpenSSL fixes serious denial-of-service bug, 11 other flaws
The scare of a second Heartbleed was unjustified Read More

Target to pay $10 million in proposed settlement for 2013 data breach
The retailer would also implement security measures to better protect consumer data Read More


WEBCAST: Nasuni

What You Need to Know About Connected Storage
Watch this exclusive video webcast with Fred Pinkett, Senior Director of Product Marketing at Nasuni, and learn how to overcome the challenges of the traditional storage stack through "connected storage." Learn More

IT manager gets certificate for Microsoft domain, tries to report it but gets in trouble
He tried to alert the company in January, but the company never got his emails, and later suspended his Microsoft account Read More

Proposed data breach notification bill criticized as too weak
The draft legislation would only apply to data linked to identity theft or financial fraud, not other customer information Read More

Opera buys VPN service to help protect user privacy
Acquiring SurfEasy will help protect the privacy of Opera's 350 million users, the company said Read More

Premera, Anthem data breaches linked by similar hacking tactics
Security analysts last year saw a fake domain spoofing Premera's name Read More

BlackBerry teams with Samsung and IBM to offer governments a secure tablet
The SecuTablet is a modified Samsung Galaxy Tab S 10.5 bundled with security management software and a hardware encryption module Read More

INSIDER
Smart machines at work: AI gets a job
Second -- and third, and fourth -- opinions concerning cancer treatment. Analysis of the impact of social media publicity campaigns within minutes of an event. Analysis of the finances of a doctor's office written entirely by a machine."If the use case is a domain that we have operated in before, the process [of creating a new smart machine] can take as little as a couple of weeks," explains Frankel at Narrative Science. "If it's new, the process could take 90 days or so. Usually a couple of people are involved from our firm and a representative from a customer."To read this article in full or to leave a comment, please click here(Insider Story) Read More


SLIDESHOWS

Google Inbox: A guided tour

This guide compares and contrasts Gmail with Inbox to help you get started with what could become Google's next-generation email service.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco replaces UCS server head; software leaders also depart

2. Top 11 oddball real-world tech job interview question

3. IT manager gets certificate for Microsoft domain, tries to report it but gets in trouble

4. 7 things we want to see in the Surface Pro 4

5. Seven killer Linux apps that will change how you work

6. IT career risks worth taking

7. Does Juniper have too many SDNs?

8. Premera hack: Another sign that data in the U.S. is under attack

9. Windows 10 will end OS reinstall headaches

10. Review: Dell's Ubuntu-powered M3800 Mobile Workstation is a desktop destroyer


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: