Search This Blog

Friday, August 21, 2015

Hiring an information security vendor? Use these best practices.

AT&T a closer partner of NSA than previously known, Snowden docs show | Mozilla tests a true stealth mode for Firefox

Network World Compliance

Hiring an information security vendor? Use these best practices.
The exponential rise in security incidents has caused many businesses to look hard at getting their own houses in order before they become the next headline. As part of those efforts, businesses are turning to security consultants to perform audits, penetration testing and other assessments of their systems. These are admirable activities, worthy of consideration by any prudent organization. But these engagements should be entered into with all the care that a business would use in any other transaction in which a third party is granted access to the company’s most sensitive systems and data. Unfortunately, this is seldom the case.To read this article in full or to leave a comment, please click here(Insider Story) Read More

: BMC Software

IT Security and Compliance
With BMC Intelligent Compliance, you can reduce both the amount of time you're vulnerable to attacks and the cost of maintaining complete IT compliance. View Now

WHITE PAPER: Cisco Systems

Cisco ASA with FirePOWER Services
Meet the industry's first adaptive, threat-focused next-generation firewall (NGFW) designed for a new era of threat and advanced malware protection. Cisco® ASA with FirePOWER Services delivers integrated threat defense for the entire attack continuum - before, during, and after an attack. Learn More

AT&T a closer partner of NSA than previously known, Snowden docs show
A new analysis of documents leaked by Edward Snowden highlights massive surveillance efforts with special help from AT&T Read More

Mozilla tests a true stealth mode for Firefox
A new tool in prebeta is designed to block browser tracking across sites Read More


Enterprise-Level PDF Accessibility
The biggest challenges in Life Sciences companies today are maintaining a robust product pipeline and reducing time to market while complying with an increasing and evolving multitude of Federal and international regulations. Learn More

DARPA wants low-power chips that handle high-impact applications
DARPA DARPA’s  Circuit Realization At Faster Timescales (CRAFT) program aims to make it easier, faster and cheaper to design custom circuits akin to this one, which was specially designed to provide a range of voltages and currents for testing an infrared sensor device that had been a candidate for an orbiting telescope. Heavyweight 3D imagery and complex unmanned aircraft systems are just two applications that beg for the low power, high performance custom integrated circuits the researchers at the Defense Advanced Research Projects Agency are looking to build.To read this article in full or to leave a comment, please click here Read More

DOJ calls for encryption balance that includes law enforcement needs
Companies encrypting customer data should weigh the benefits to cybersecurity against needs of law enforcement, officials say Read More

WHITE PAPER: Riverbed Technology

How Today's Hybrid Enterprises Thrive in Disruptive Times
While hybrid architectures and SaaS applications bring significant cost and flexibility benefits to enterprise users, they're creating unprecedented challenges for IT. In order to prioritize according to business needs, and to deliver an optimal and consistent end-user experience. View Now>>

Oracle's new 'PULA' license promises unlimited database use in perpetuity
'We have seen them in the wild,' one consultant confirms Read More

DARPA wants to transform vacuum electronics for superior communications, data transmissions
The notion of vacuum electronics may sound ancient in high-tech terms but a new program from the scientists at the Defense Advanced Research Projects Agency aims to transform the widely-used equipment into the next century.According to DARPA, vacuum electron devices (VEDs) are critical components for defense and civilian systems that require high power, wide bandwidth, and high efficiency, and there are over 200,000 VEDs currently in service.+More on Network World: DARPA wants to make complex 3D printing trustworthy, dependable, safe+To read this article in full or to leave a comment, please click here Read More


Top 10 techie vacation spots

Whether you want to unplug or plug-in, check out these getaways.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. 3 things Cisco's new CEO Chuck Robbins needs to focus on

2. Cisco: Flash exploits are soaring

3. Google releases stylish $199 Wi-Fi router meant to be shown off

4. 19 free cloud storage options

5. A spider made Wil Wheaton brick his phone

6. Proposed solutions for fixing Reserve Windows 10 problems

7. 8 new threat intelligence products to make you bulletproof

8. Windows 10 still contacts Microsoft even when told to stop

9. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac

10. Is the cloud the right spot for your big data?

Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **

No comments: