Wednesday, June 05, 2013

Google biometrics tests show there's no magic pill for passwords

  9 tips, tricks and must-haves for security awareness programs | Microsoft study shatters myth, says social media use increases work productivity
 
  Network World Security

Forward this to a Friend >>>


Google biometrics tests show there's no magic pill for passwords
While passwords fall short of the tight security businesses would like, the use of electronic tattoos and pills that Google is experimenting with would introduce a new set of problems, experts say. Read More


WEBCAST: NetIQ

The Future of Identity in a world of Cloud and Mobility
Cloud, Mobility, Social Identity and BYOD are forcing small businesses, major enterprises and government agencies to re-think their interaction with customers and partners. Learn More>>

WHITE PAPER: Stonesoft Corporation

Stonesoft Firewall Appliances for Demanding Environments
To keep up with today's sophisticated threats and complex network traffic, a first generation firewall will not do. View now

9 tips, tricks and must-haves for security awareness programs
What are the essential ingredients for making a security awareness program successful? Check out these 9 tips from CSO contributors on how to make awareness work in your organization. Read More

Microsoft study shatters myth, says social media use increases work productivity
Does your boss frown on using social media while you are at work because it is a distraction that decreases productivity? Well you can tell him or her that's a myth, since new results from a two-year study found that using social media at work actually increases productivity. Read More


WHITE PAPER: Cisco Systems

Getting the Most Out of Your Next-Generation Firewall
Trends such as BYOD and the adoption of social media and other grey applications as legitimate business tools have had profound effects on organizations of all sizes. Read Now

IBM shows off nickel-sized chip that backs Gb/sec wireless data-rates, cutting edge radar images
IBM says it has packed an integrated circuit about the size of a nickel with technology that can enable gigabit/sec mobile data-rate and clutter-cutting radar image applications. Read More

Malware going retro in 2013, security firm finds
Malware perpetrators turned to their old tricks in the first quarter of this year, a threat report released Monday by the cybersecurity firm McAfee finds. Read More


WHITE PAPER: F5 Networks

Stop Frequent DDoS Attacks Before the Damage Is Done
This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while securely delivering applications and protecting the network, the session, and the user. Read Now.

Plugging network leaks
Plugging network security leaks is an essential responsibility for companies, private organizations and technology professionals. Achieving that goal requires discovery tools that scour every asset, including those not currently under management, and also map connectivity between institutions involved with an organization's sensitive information around IT compliance, corporate security, product development, critical infrastructure protection and other relevant issues. Read More

From Morse code to Marimba: The noisy history of technology alerts
Since we invented communications devices, we've had to come up with ways they can let us know we should pay attention to them. Based on what we see in the world today, maybe they do too good a job. Read More

Oracle reveals plans for Java security improvements
Oracle plans to make changes to strengthen the security of Java, including fixing its certificate revocation checking feature, preventing unsigned applets from being executed by default and adding centralized management options with whitelisting capabilities for enterprise environments. Read More

 
 
 

SLIDESHOWS

12 must-play Android games

Our top picks for gaming on your Android device.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. A serious plan to fix Windows 8

2. I'm ditching Windows Phone 8 again, but not without reservations

3. How to build a private cloud

10. New laptops and hybrids emerge as 'fatbooks' are kicked to the curb

8. Canada's new wireless rules a big win for customers

5. Why a teenage girl's smartphone battery breakthrough may never see daylight

9. iPhone 6 rumor rollup for the week ending May 31

6. Stack wars: OpenStack v. CloudStack v. Eucalyptus

7. Intel shows first smartphone with Merrifield chip

4. 7 things you can do to make Internet Explorer more secure

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment