Wednesday, June 26, 2013

Dell pushes harder on encryption, anti-malware for client devices

  There is no universal right to be forgotten, says top EU court advisor | Hacking and attacking automated homes
 
  Network World Security

Forward this to a Friend >>>


Dell pushes harder on encryption, anti-malware for client devices
Dell today said it's ready with new anti-malware defense and encryption offerings for businesses using its PCs, laptops and Android-based mobile devices. Read More


WHITE PAPER: Stonesoft Corporation

Stonesoft Firewall Appliances for Demanding Environments
To keep up with today's sophisticated threats and complex network traffic, a first generation firewall will not do. View now

RESOURCE COMPLIMENTS OF: LogMeIn

Powerful and secure remote support with LogMeIn Rescue
For companies that want to compete in their industry, improving the customer experience is a top priority. To do that, having an on-demand remote support solution is essential. That's why companies around the world choose LogMeIn Rescue to provide powerful, secure support of any device, anytime, anywhere. Rescue offers a simple, reliable interface packed with all the features technicians want. Check out LogMeIn Rescue to learn more and start your free trial today.

There is no universal right to be forgotten, says top EU court advisor
The senior advisor to Europe's top court said Tuesday that Google is not responsible for third party information in its search results and that there is no universal "right to be forgotten" under the current data protection laws. Read More

Hacking and attacking automated homes
If you added a home automation system to create your version of a "smart" house, it could give you access from anywhere in the world to remotely control your lights, door locks, house temperature, electric appliances, water valves, alarm system, garage door, the ability to open and close your shades and blinds, or even to turn on music and crank up the volume. While that might seem pretty sweet, it... Read More

BYOD blues: What to do when employees leave
The bring your own device (BYOD) trend is gaining steam, thanks to the cost benefits and increased productivity that can come from allowing employees to provision their own technology. Mobile workers are more likely to put in more hours, so if your employees want to buy their own equipment and do more work on their own time, it's a win for the company. Read More


WHITE PAPER: Dell Inc.

2013 Next Generation Firewall Security Value Map
Read this case study to learn how ZapFi enabled comprehensive gateway security and granular application intelligence for large-volumes of wireless and VPN traffic. In addition, ZapFi eliminated overhead and latency, by integrating Dell SonicWALL SuperMassive, TZ Series and Global Management System (GMS) solutions. View Now

FBI/IC3 warns of growing spear-phishing attacks
Criminal spear phishing attacks are on the rise, so much so that the FBI and Internet Crime Complaint Center issued a warning about them. Read More

Quick look: 10 cool analog computers
In their heyday analog computers handled heavy-duty math, scientific and industrial applications Read More

Encryption would exempt ISPs from data breach notification to EU customers
From around the end of August, European Union telecoms providers and Internet Service Providers (ISPs) will have to comply with new rules to ensure that customers in all E.U. countries receive the same information if their personal data is lost, stolen or otherwise compromised. Read More


WHITE PAPER: Cisco Systems

Getting the Most Out of Your Next-Generation Firewall
Trends such as BYOD and the adoption of social media and other grey applications as legitimate business tools have had profound effects on organizations of all sizes. Read Now

Keep watch: 5 cloud security cameras for your home
Cloud-based security cameras can keep watch on your home when you're not around. We tested 5 of these systems and report on our findings. Read More

WordPress plugins leave you vulnerable to attack, and new devices 'protect you' from cellphone radiation
First up this week, a white paper or report or ... I have no idea what these things should be called any more ... maybe a "glorified press release"? Whatever. Let's call it "a study" from Checkmarx, a company that specializes in automated security code review, titled "The Security State of WordPress' top 50 Plugins." Read More

Genband beefs up security, control and packet inspection through NextPoint buy
IP gateway supplier Genband announced last week that it had acquired NextPoint Networks, a provider of carrier-grade security products, including session border controllers (SBC) and security gateways for fixed-mobile convergence. The acquisition adds security capabilities to Genband's gateway products and "puts the company on an aggressive product development path aimed at the integration of emerging technologies like security, control and packet inspection," according Genband. Read More

 

SLIDESHOWS

Ultimate ultrabook shootout

Testing of eight Windows 8 ultrabooks reveals that users looking for a sleek form factor will have to accept tradeoffs.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco delivers "monster" Catalyst switch in major product refresh

2. iFixit giving away 1,776 'iPhone Liberation Kits'

3. Ultimate ultrabook shootout

4. Data center outage takes French state financial system offline for four days

5. Google making steady progress in the enterprise

6. 6 highest/lowest paid IT jobs

7. Scientist out to break Amdahl's law

8. Getting the most out of flash storage

9. Hey, Cambridge: Netscape 4.0 was released in 1997

10. iPhone 6 rumor rollup for the week ending June 21

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment