Search This Blog

Wednesday, October 27, 2010

Juniper rolls out smartphone security suite

Security Matchup – iPhone vs. Windows Phone 7 | Skeptical Shopper: E-Coupons May Track Spending Habits

Network World Security

Forward this to a Friend >>>


Juniper rolls out smartphone security suite
Juniper this week unveiled software, based on its recent purchase of sMobile, to protect mobile devices from security threats. Read More


WHITE PAPER: Symantec

Global Threat Intelligence for the well informed SMB
Please read the "Quick Tips for SMBs" that were gleaned from the Threat Report to learn more about how to help your company protect their business information. Read Now.

WEBCAST: Bradford Networks

Step-by-Step Process to Network Security
Hear from one financial services IT pro who thought his network was completely secure until it failed an internal security audit. Tim Childress from the credit card division of Bridgestone discusses the unique approach he took to improve network security. Hear how he met his objectives to stop rogue devices, gain better network visibility. View now

Security Matchup – iPhone vs. Windows Phone 7
An in-depth comparison of security specific features table.MSOTABLEGRID {mso-border-bottom-themecolor:text1; mso-border-insideh-themecolor:text1; mso-border-insidev-themecolor:text1; mso-border-left-themecolor:text1; Read More

Skeptical Shopper: E-Coupons May Track Spending Habits
The advent of online coupons has made shopping and saving that much easier. In an earlier era, people spent their Sunday mornings clipping coupons out of the newspaper. Now, you can download coupons from dedicated sites like Coupons.com or Ebates.com, or even social networking sites like Facebook and LinkedIn. But this convenience carries certain privacy risks: Some companies track consumer spending habits based on the coupons those consumers use. Read More

Cyber war, cyber espionage and your network security
Cyber-rattling by military fuels ongoing debate and struggle for controlA story by Seymour Hersh in The New Yorker lays out the competing interests at work to determine future responsibility for securing the nation's critical electronic infrastructure, including power grids and the Internet. As framed by Hersh, much of the debate hinges on drawing -- and blurring -- distinctions between cyber espionage and so-called cyber war.    From the article: Read More


WHITE PAPER: Sophos

Safer web browsing in four steps
This white paper examines the latest web threats, and recommends four best practices and a layered approach that enables your users while also protecting your organization's endpoints, network and data. Read Now

Intego highlights iOS 4.1 iPhone security flaw
A new iOS 4.1 flaw has been spotted that could compromise Apple iPhone users. Read More

SecTor 2010: Why security is the enemy of privacy
Some might expect security to be the answer for privacy protection, but it's often part of the problem. Tracy Ann Kosa, a privacy impact assessment specialist with the government of Ontario, explains why at SecTor 2010. Read More

.Com deemed the riskiest top-level domain, wrests title from Cameroon
The .com domain is the riskiest in terms of containing code that can steal passwords or take advantage of browser vulnerabilities to distribute malware, according to security vendor McAfee. Read More


WHITE PAPER: HP

Network Security with IP and DNS Reputation
Learn how HP TippingPoint IP and DNS reputation services can act as a first line of defense against the rapidly expanding sources of bad network traffic, including botnets, malware, phishing sites, and compromised hosts – saving your company time, money, and embarrassment. Read now.

Cloud services raise security, privacy concerns, experts say
A move toward more and more services in the cloud is inevitable, but vendors still need to focus on security, and the U.S. government needs to rewrite privacy laws to protect cloud customers, a group of experts said Tuesday. Read More

Targeted attacks rise, retail sector under siege
Targeted attacks via fraudulent and dangerous e-mail are on the rise, according to a Symantec report published today. Read More

Cameras, radar, advanced sensors all part of your future car
Cars to get even more technology to bolster safetyIn theory at least, as cars are outfitted with more advanced electronics,  safer vehicles should be at least one of the main results. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

The world's coolest data centers
Data centers need to be secure, temperature controlled, spacious, redundant, reliable – nothing sexy. But that doesn't mean they can't be. Here are a few that rise above the crowd and take advantage of the possibilities.

10 spooky Halloween iPhone apps
iPhone app developers have been working overtime this year to help you transform your favorite device into a high-tech scarephone. Have they succeeded? We'll let you be the judge of these 10 spoooooooky iPhone apps.

MOST-READ STORIES

  1. Open source report: Ubuntu moves away from GNOME
  2. Google TV teardown a letdown
  3. 25 new IT companies to watch
  4. Firefox add-on Firesheep brings hacking to the masses
  5. Cisco FabricPath enables faster, flatter data center networks
  6. Buzzblog: Why IPv6? Vint Cerf keeps blaming himself
  7. 25 hot products from new IT companies
  8. Burning questions: virtualization
  9. 4G defined: WiMAX and LTE don't qualify
  10. Broadband stimulus brings WiMAX to rural U.S.

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: