Wednesday, December 19, 2012

15 (FREE!) security tools you should try

NASA Inspector General doubts space agency can hit mandatory computer encryption goals | FTC hits up 9 data brokers for info on how they collect and use private data

Network World Security

Forward this to a Friend >>>


15 (FREE!) security tools you should try
Read More


RESOURCE COMPLIMENTS OF: Sourcefire

Your Company Has Just Been Attacked by Malware – Now What?
Sophisticated malware attacks can take any organization by surprise. Silver bullet solutions don't work. Sourcefire's Advanced Malware Survival Kit gives you a better way to defend against and respond to today's advanced malware attacks – before, during and after the threat. Download our Incident Response Brief: 4 keys to effective malware defense/response strategies.

WEBCAST: HP

Storage in the Cloud
Cloud will impact your storage environment. Hear what a HP Storage expert has to say. View Now!

NASA Inspector General doubts space agency can hit mandatory computer encryption goals
NASA's Inspector General said this week it doubts the space agency can hit its own mandatory deadline to encrypt all laptops by December 21. The IG's office has written scathing reports on NASA's the encryption efforts in the past year and the latest item was no exception: Read More

FTC hits up 9 data brokers for info on how they collect and use private data
The Federal Trade Commission today said it orders to nine data brokerage companies to report how they collect and use data about consumers. Read More


WHITE PAPER: HP

Extend the Life of Your Storage
Leveraging deduplication in backup environments yields significant advantages. The cost savings in reducing disk capacity requirements change the economics of disk-based backup. Read Now!

INSIDER
Juniper CEO Johnson talks software, the company's recent challenges and key future directions
Juniper Networks had a challenging 2012 as new product cycles were slow to take hold and global economic conditions took a toll on sales. The company also undertook a restructuring that saw 500 positions cut and the departure of four executive vice presidents. As the Sunnyvale, Calif.-based company looks to re-energize its business, particularly with an eye towards enterprises and data centers, CEO Kevin Johnson shared his lessons learned in leading Juniper since 2008, as well as what's ahead for the company in a discussion with IDG Enterprise Chief Content Officer John Gallant and Network World Managing Editor Jim Duffy. In this installment of the IDG Enterprise CEO Interview Series, Johnson also shared his thoughts on the hot topic of software-defined networks (SDN), Juniper's role in enabling cloud and competing against the industry's 800-pound gorilla, Cisco. Read More

Executive Management Are Becoming More Engaged In Information Security
Dealing with business and executive managers has been a persistent occupational hazard for security professionals. Business managers didn't want policy enforcement to get in the way of business productivity. CEOs and CFOs tended to eschew "good security" for "good enough security." The biggest role they played here was that of budget cutter. Read More


WHITE PAPER: Quest Software

The Right Way to Prove Identity and Establish Trust
Right now, someone's logging into your network and accessing proprietary data. Do you know who it is? Ensuring the identity of the person(s) trying to access your network is harder than ever. This Quest technical brief explains why two-factor authentication is superior to password authentication. Read Now!

Android botnet abuses people's phones for SMS spam
In a new twist, spammers have built a botnet that sends SMS spam through infected Android phones, shifting the potentially pricey cost of sending spam to victims. Read More

10 technologies that disappointed in 2012
Read More

5 tips to retain great security talent
You want the best on your security team. And once you've got them, you want to keep them happy and keep them in your organization. Read More

With blue-chip backing, joint venture firm looks to embed crypto technology in mobile devices, electronic payments
The London-based firm Trustonic made its official debut today to provide crypto-based technology for use in chips for a wide variety of purposes, including enterprise security such as VPNs, mobile-device security, payment services, and control over how content can be delivered for entertainment. Read More



SLIDESHOWS

10 technologies that disappointed in 2012
Here are 10 technologies that fell short of expectations in 2012.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 16 of the most useful cloud management tools
  2. Blue Coat second company to buy Crossbeam Systems in recent weeks
  3. Ray Ozzie seeks encore to Lotus Notes, Microsoft triumphs
  4. How removing 386 support in Linux will destroy the world
  5. Microsoft's antivirus is a starting point, not the final stop
  6. iPhone 6 rumor rollup for the week ending Dec. 14
  7. IBM: In the next 5 years computers will learn, mimic the human senses
  8. Cisco reportedly shopping Linksys division
  9. Facebook vs. Fastbook: Developers offended by Zuckerberg knock on HTML5 make clone app
  10. Riverbed announces three releases for the Steelhead Mobile Controller appliance

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment