How Cisco's Sourcefire acquisition impacts its security prospects | 10 competitors Cisco couldn't kill off | |||||||||
Network World After Dark | |||||||||
Cisco-Sourcefire union raises product overlap questions In this Issue
WHITE PAPER: Tripwire So Much Data, So Little Control It used to be that all you had to do to protect your company's intellectual property and customer information was lock the file drawers and, later, put layers of defenses around the data center. Learn More How Cisco's Sourcefire acquisition impacts its security prospects 10 competitors Cisco couldn't kill off Bill Gates's return may save Microsoft, but it's not likely Apple reportedly testing larger-screened iPhones and iPads Chase, American Express, Office 365 vulnerable to cookie replay attacks How ambitious is Canonical's $32 million Ubuntu Edge crowd-funding campaign? Leave it to baseball Hall of Famer Ted Williams to create the best infographic ever Wireless may replace phone lines in Sandy-ravaged areas of N.Y., N.J. TV station using DMCA to yank 'fake pilot names' clip off YouTube | |||||||||
SLIDESHOWS 12 of the worst data breaches of 2013 so far The Identity Theft Resource Center, which tracks disclosed data breaches, has recorded 301 for the first half of 2013. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). MOST-READ STORIES 1. U.S. high-tech industry feeling the heat from Edward Snowden leaks 2. 10 competitors Cisco couldn't kill off 3. Chambers: Cisco will become the number 1 IT company 4. F5 data center firewall aces performance test 5. Black Hat: Top 20 hack-attack tools 6. Cisco spending $2.7B for Sourcefire 7. Happy birthday, OpenStack! Now change 8. US court renews permission to NSA to collect phone metadata 9. USA PRISM Plus, the perfect NSA photo-sharing app for those who have nothing to hide 10. Just like that, Android 4.3 is out, ahead of its release date | |||||||||
Do You Tweet? You are currently subscribed to networkworld_after_dark_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
No comments:
Post a Comment