Friday, April 26, 2013

Cisco edges F5 in VPN shootout

  CEO pay: Cash, stock awards, perks add up to big pay packages | 10 tips to secure funding for a security program
 
  Network World Compliance

Forward this to a Friend >>>


INSIDER
Cisco edges F5 in VPN shootout
Connecting remotely to network servers is a fact of life for millions of end users. Whether working from a PC or a mobile device, users rely on secure, reliable remote connections to maintain their productivity. Read More


WEBCAST: CA Technologies

CA Service Operation Insight
See how a VP of Operations and his team have improved their ability to quickly respond to incidents that impact or pose risks to the quality and availability of their critical online business services. Learn More

CEO pay: Cash, stock awards, perks add up to big pay packages
Median pay for tech CEOs in 2012 was $10.7 million, according to Network World's analysis of CEO compensation in the tech industry. Read More

10 tips to secure funding for a security program
Ask any cyber security specialist what their biggest challenge is, and you will get a variety of answers -- ranging from strengthening network security, to managing internal threats, to protecting against cyber espionage. But upon further investigation, you may be surprised to learn that the unanimous pick for the biggest challenge cybersecurity professionals face is simply getting the funding necessary to carry out a security program. There are a great deal of resources and technical support available on how to deal with the never-ending list of threats that arise daily; and we have plenty of opportunities to learn and digest security best practices. However, little information or guidance is available to prepare one for the dreaded budget discussion when new or continued funding is necessary to maintain a strong cyber security posture. Read More

DHS use of deep packet inspection technology in new net security system raises serious privacy questions
To protect the federal civilian agencies against cyberthreats, the Department of Homeland Security (DHS) is preparing to deploy a more powerful version of its EINSTEIN intrusion-detection system that's supposed to detect attacks and malware, especially associated with e-mail. But since this version of EINSTEIN is acknowledged by DHS to be able to read electronic content, it's raising privacy concerns. Read More


WHITE PAPER: Cisco Systems

Winning Strategies for Omnichannel Banking
Research reveals new ways for banks to prosper. Customers are ready for omnichannel experiences. Respond now-learn how to manage the transition to omnichannel banking and reap the rewards of delivering innovative services. Read Now

How to track a lost computer with Find My Mac
If your computer is stolen or otherwise liberated from your possession, don't despair: If you've remembered to enable Find My Mac, you can track it, remotely lock it, and even send messages to your Mac's screen. Read More

Online security: your two-factor authorization checklist
Twitter reportedly is getting ready to roll out two-factor authentication in the coming weeks--a development that comes not a moment too soon as the company's current security efforts fall short. Read More

McAfee offers one-time passwords for single sign-on cloud service
McAfee Thursday announced it's providing a one-time password function as part of its Cloud Single Sign On service for more securely provisioning and de-provisioning hundreds of cloud-based services for enterprise use. Read More


WEBCAST: Trusteer

Security Requirements vs. Operational Challenges
In this webinar, guest speaker Rick Holland, senior analyst serving Security & Risk Professionals at Forrester Research, Inc., will discuss the security and operational challenges associated with advanced malware protection. Learn More.

Novell's new Filr software offers secure alternative to Dropbox
Novell is preparing to release Filr, a new on-premise file sharing product for organisations that want some of the convenience of a Dropbox-like approach while keeping data management under internal control. Read More

Viewpoint: When it comes to enterprise security, is it better to focus on compliance or risk?
A CIO once quipped, "Security isn't hard, compliance is." And in fact many companies focus their security efforts on meeting compliance requirements. But if you are audit compliant, have you in fact addressed all of your risks, or are you just kidding yourself? Is it better to focus on the risks presuming that doing so will cover you off on the compliance side? Network World Editor in Chief put the question to two practitioners, both of whom come down on the side of risk. Read More

Amazon looks to move security appliances to the cloud, says CISO
Amazon Web Services (AWS) is looking to expand its security offerings with hosted intrusion protection appliances and more extensive encryption features, as it looks to increase the level of protection users can get in its cloud. Read More

Products of the week 4.22.13
Our roundup of intriguing new products from companies such as Symantec and Radware Read More

 
 
 

SLIDESHOWS

25 weirdest things in the 'Internet of Things'

The Internet is slowly creeping into every part of our lives, so much so that it's becoming easier to look around the house and find objects that can be connected to the Internet.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. DHS use of deep packet inspection technology raises serious privacy questions

2. IBM robotic coworker will help engineers fix broken systems

3. CEO pay: Cash, stock awards, perks add up to big pay packages

10. Windows 8 update: Transition from Android to Windows Phone made easier

9. Cisco's new director-class storage switch boosts throughput 6X

6. What the man behind HP's new internal IT plan has in mind

5. Juniper switching boss talks technology challenges, Cisco Nexus 6000

4. 25 weirdest things in the 'Internet of Things'

7. NASA launches smartphone satellites

8. Shopzilla sends bottle to make amends for trademark whine

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment