Tuesday, July 16, 2013

Start-ups lean hard on CPU-based security technology to protect virtual environments

  Security Manager's Journal: Suddenly, our firewall audit can't wait | Encryption no protection from government surveillance
 
  Network World Security

Forward this to a Friend >>>


Start-ups lean hard on CPU-based security technology to protect virtual environments
The idea of relying on the server or desktop central processing unit (CPU) as the key part of a security scheme is getting more attention as a number of start-ups are using the technology to protect virtual systems. Read More




WEBCAST: IDG

How to Consistently Extend Policies to Your Wireless Network
In this webcast, Tim McCarthy of Juniper Network joins Joanie WexlerT to discuss how to implement and manage policies uniformly across both the wired and mobile side of your network. They also review tools you will need, policies that are unique to mobile users and the role of software-defined networking (SDN) in managing Wi-Fi. View now.

Security Manager's Journal: Suddenly, our firewall audit can't wait
After a DDoS attack was discovered by chance, 'later this year' is too long to wait. Read More

Encryption no protection from government surveillance
Microsoft, Skype and other online service providers regularly tell their customers that customer privacy is "our priority." Perhaps they should add a disclaimer, that orders from the federal government seeking surveillance of those customers are a higher priority. Read More

Unusual file-infecting malware steals FTP credentials, researchers say
A new version of a file-infecting malware program that's being distributed through drive-by download attacks is also capable of stealing FTP (File Transfer Protocol) credentials, according to security researchers from antivirus firm Trend Micro. Read More


WHITE PAPER: IBM

Introducing Social Business for the Mid-Market
This report provides directional guidance for mid-market companies to appropriately use Social Business to achieve their goals. Learn More.

Quick look: Death of India's telegram system
The 160 year-old institution hit hard by Internet, mobile phones Read More

4 methods of crowd-sourced bug detection
The demands on quality are greater than ever, with so many software applications passing data through shared networks and cloud environments. With more critical systems being developed for healthcare, finance, government and defense, companies are rightly concerned with security and vulnerability issues. They are also faced with the difficulties of uncovering complex issues that would be expensive... Read More

How much privacy will you have with Microsoft's 'family of devices'?
Windows may only be a "shell" now, said six different times by Steve Ballmer as he revealed a new strategy for Microsoft that revolves around a "family of devices." The company will "design, create and deliver through us and through third parties a complete family of Windows-powered devices," which will include "a full spectrum of both partner and first-party devices. Read More


WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

High-tech tool can help interpret health clues from crying babies
Figuring out what exactly is wrong with a crying baby can be a frustrating experience for parents and doctors. Is the cry from pain, hunger or something worse? In a rather interesting development announced this week, an automated software and sensor system developed at Brown University may begin to unlock some clues. Read More

Mobile malware, mainly aimed at Android devices, jumps 614% in a year
Mobile malware attacks -- most of them aimed at Android devices -- are up six-fold since last year, an increase due mainly to the use of free mobile apps from sketchy vendors, according to studies by McAfee and Juniper Networks. Read More

Targeted attacks exploit now-patched Windows bug revealed by Google engineer
Microsoft this week said a pair of vulnerabilities, including one publicly disclosed by a Google security engineer in May, had been exploited in the wild before they were patched on Tuesday. Read More

 

SLIDESHOWS

6 rising open source stars

Names you'll want to know in the free software/open-source world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPad 5 rumor rollup for the week ending July 11

2. Why the enterprise can't shake its email addiction

3. Microsoft's latest Patch Tuesday vulnerabilities already being exploited

4. 10 hot security startups to watch

5. Top open source network management tools

6. 6 highest/lowest paid IT jobs

7. Memo from Steve Ballmer to Microsoft employees: Let's go!

8. Pick your hardware vision: Open Compute Project vs. 'data centers in a box'

9. What's in the cards for Android 5.0?

10. Free video conversion software

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment