Tuesday, November 08, 2011

"Mudge" Zatko shaking up DARPA's security software routine

Wi-Fi security do's and don'ts | 5 hot tech projects to boost your IT career

Network World Security

Forward this to a Friend >>>


"Mudge" Zatko shaking up DARPA's security software routine
WASHGINTON, DC -- Getting non-traditional security technology quickly into military networks was at best a trying experience. Not only that, if you or your company had a novel security tools the last place you may have wanted to show it off would have been to the government. Read More


WHITE PAPER: CA Technologies

Building the Next Generation Data Center
Virtualization promotes flexible utilization of IT resources, reduced capital costs, high energy efficiency, highly-available applications, and improved business continuity. Learn More

WHITE PAPER: Intel

Boost virtualization w/ HP & Intel 10GbE
This paper describes why the Intel® Ethernet X520 SFP+ Direct Attach (DA) Server Adapter for HP ProLiant Rack and Tower servers is one of the most flexible and scalable Ethernet adapters for today's demanding data center environments. Click to continue

Wi-Fi security do's and don'ts
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths. Read More

5 hot tech projects to boost your IT career
Take the reins of any of these five forward-looking initiatives and become an IT hero in the eyes of upper management Read More

US cyber chief says cloud computing can manage serious cyber threats
The security of cloud computing is often debated but such debates seem to be over for the general tasked with running the United States military's cyber command, who sees the technology not only as way to rein in IT costs but a way to more easily protect IT assets. Read More


WHITE PAPER: IBM

A Smarter Approach to CRM
With instant access to information, customers expect a purchase experience that matches the ease and speed of the information-gathering experience. Read this white paper, created in collaboration with Frost & Sullivan, to see how a customer relationship management (CRM) solution can help you respond on the customers' terms. Read Now

Assessing the APT threat
Do security vendors secretly create the attacks their tools are designed to ward off? Of course not, but that old chestnut hints at a broader suspicion about whether the current state of security is really as bad as the security firms make it out to be, especially when it comes to the latest poster child: advanced persistent threats. Read More

KPN stops issuing SSL certificates after possible breach
The largest telecommunications company in the Netherlands has stopped issuing SSL (Secure Sockets Layer) certificates after finding indications that the website used for purchasing the certificates may have been hacked. Read More

RSA and McAfee add cloud security offerings
Cloud security options are set to widen today as RSA teams with Microsoft and Citrix to support use of RSA SecurID authentication, and separately, McAfee unveils enhancements to the McAfee Cloud Security Platform. Read More


WHITE PAPER: Raritan

Data Center Transformations
This paper discusses ways to simplify data center transformation and introduces a new process – BOCA – Build Outs, Consolidations and Acquisitions. Learn the five stages of BOCA and see how the right remote access and IT infrastructure management tools, deployed early and continuously monitored, can dramatically improve overall efficiency. Read now!

Accused Chinese cyber-spy on trial for stealing Motorola secrets
Software engineer Hanjuan Jin, accused of stealing thousands of confidential and proprietary technical documents from Motorola to share with competitors and the People's Republic of China, is expected to stand trial this week in Chicago. Read More

CIA monitors up to 5 million tweets daily, report says
Twitter and Facebook are enabling the Central Intelligence Agency to get reliable, real-time assessments of public sentiment during rapidly changing events around the world. Read More

RSA to integrate SecurID tokens with Microsoft cloud, Citrix virtual desktops
If you want to use single sign-on with Microsoft's clouds, the go-to method is a Microsoft product called Microsoft Windows Active Directory Federation Services 2.0 (ADFS). RSA on Monday announced ADFS can now tap into RSA's SecurID tokens. Read More



SLIDESHOWS

Security Industry All-Stars
Welcome to the Security All-Stars! Here we have assembled our list of top players in information security who year after year demonstrate the specialized skills that make them worth listening to.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. iPhone 5 rumor rollup for the week ending Nov. 4
  2. Linksys prevails in dual-band duel
  3. Wi-Fi security do's and don'ts
  4. Gartner: 10 key IT trends for 2012
  5. Japanese supercomputer blisters 10 quadrillion calculations per second
  6. HP labeled "highest risk: by disclosure watchdog firm
  7. Surprise! Windows Phone gaining traction
  8. Fabric wars: Cisco vs. Brocade vs. Juniper
  9. Microsoft releases manual fix for Duqu zero-day
  10. 5 hot tech projects to boost your IT career

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment:

  1. Anonymous5:01 PM

    ztjgm [url=http://www.drdrebeatscheapsales.com]beats by dre sale[/url] kngbvw http://www.drdrebeatscheapsales.com njdl [url=http://www.drebeatsstudioheadphones.com]beats by dre sale[/url] clcpzq http://www.drebeatsstudioheadphones.com zilq [url=http://www.beatsdreheadphonesonsale.com]cheap beats by dre[/url] ybanak http://www.beatsdreheadphonesonsale.com lfdkm [url=http://www.dreheadphonesonsales.com]monster beats[/url] xrxiph http://www.dreheadphonesonsales.com vfwbq [url=http://www.drdrebeatssales.com]dr dre beats[/url] ebbwg http://www.drdrebeatssales.com hbjnp [url=http://www.beatsheadphonesbydrdre.com]beats headphone[/url] pdyrd [url=http://www.focsa.org.au/myreview/beatsbydre.phtml]cheap beats[/url] dypzi http://www.focsa.org.au/myreview/beatsbydre.phtml wmq

    ReplyDelete