Friday, July 12, 2013

Cyber rogues aren’t the only threat to energy supply, changing environment offers plenty of challenges

Defcon: Website woes unrelated to our beef with feds | The ban on feds at Defcon draws a mixed reaction

Network World Security

Forward this to a Friend >>>


Cyber rogues aren't the only threat to energy supply, changing environment offers plenty of challenges
The Nation's energy infrastructure isn't just at risk via online security rogues. The US Department of Energy today released a report that details the growing dangers from our Read More


WHITE PAPER: Cisco Systems

Data Center Dinosaur: Adapt or Die
Nearly everything in data centers is changing, from cabling and network design, to more sophisticated, faster compact builds. Network security has to adapt, and IT must drive new security approaches--installing technologies and policies that can protect today's and tomorrow's data centers. Read more >>

WHITE PAPER: Netscout Systems Inc.

Holistic Service Management is Critical to the Growth of IT
This paper looks at new approaches to service delivery management to allow IT organizations to deliver better service quality, performance and user experience, and to be more predictive with application performance management and network performance management. Learn More.

Defcon: Website woes unrelated to our beef with feds
Defcon's Jeff (The Dark Tangent) Moss yesterday wrote a blog post informing federal agencies that their employees will not be welcome at this year's security conference -- as they have been for 20 years running -- because of the ongoing controversy over government surveillance programs. Also yesterday, Defcon's website was down at times, drowsy at others. In fact, even this morning it was initially... Read More


WHITE PAPER: Tripwire

So Much Data, So Little Control
It used to be that all you had to do to protect your company's intellectual property and customer information was lock the file drawers and, later, put layers of defenses around the data center. Learn More

The ban on feds at Defcon draws a mixed reaction
Call for U.S. government workers to avoid security conference rankles some cyber warriors, gets cheers from others Read More


WHITE PAPER: IBM

Gaining and Executing a Smarter Understanding of Customers
This article discusses the urgent need for firms to successfully engage with customers, including handling issues such as social media and mobility, and at accomplishing this goal with smarter IBM collaboration and CRM solutions. Learn More.

Goodbye NAC, Hello EVAS (Endpoint visibility, access, and security)
Around 2004, Cisco introduced a new technology initiative called Network Admission Control (now commonly referred to as Network Access Control or NAC). Back then, NAC was really in response to the recent wave of Internet worms where one compromised user PC could log on to the corporate network and subsequently infect the whole enchilada. NAC was seen as a way to alleviate this threat by authenticating... Read More

Authentify xFA provides simple, secure primary authentication using digital certificates and voice biometrics
Forget about those highly vulnerable usernames and passwords. Authentify has just announced a new primary authentication method that is built upon a complete digital certificate PKI underpinning, but neither the enterprise nor the end user sees any of the complexity of the solution. Read More

Insurance company, WellPoint, fined $1.7m over data exposure
Insurance provider WellPoint has agreed to pay a $1.7 million fine for exposing more than 600,000 personal records online due to weak database security, the U.S. Department of Health & Human Services (HHS) said Thursday. Read More


SLIDESHOWS

6 rising open source stars

Names you'll want to know in the free software/open-source world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 6 highest/lowest paid IT jobs

2. Best college tech majors for landing a top starting salary

3. How to solve Windows 8 crashes in less than a minute

4. Cisco impresses with first crack at next-gen firewall

5. 8 hot mobile startups to watch

6. 10 biggest home networking mistakes (and how to fix them)

7. Meet the next open-source stars

8. The worst cloud outages of 2013 (so far)

9. The biggest security snafus of 2013

10. A look at 22 Linux Foundation newbies


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment