Tuesday, October 01, 2013

Cisco, Intel push 'trusted geolocation in the cloud'

Network World Security - Newsletter - networkworld.com
iOS 7 security update patches lockscreen flaw | Debunking data breach myths

Network World Security

Forward this to a Friend >>>


Cisco, Intel push 'trusted geolocation in the cloud'
Cisco and Intel say that companies wanting to make use of Infrastructure-as-a-Service (IaaS) clouds should be aware that control exists for keeping virtual workloads on servers within country borders. Read More


WHITE PAPER: Dell SecureNetworks

CISO's Guide to Advanced Attackers
No matter the size of your organization, advanced cyber-attacks represent a credible threat to your organization. Security analyst firm Securoris and Dell SecureWorks collaborated on this guide to help gather intelligence, mine for threat indicators, respond to alerts and break the attack process. Read now!

RESOURCE COMPLIMENTS OF: CITE Conference

Your pad or mine? BYOD is changing everything.
Tablets and mobile devices are driving a BYOD revolution in the enterprise. Come to Consumerization of IT in the Enterprise One-Day Forum(CITE) November 5, 2013 in New York City and learn how top IT leaders have made it work for them…and how you can, too. Learn more

iOS 7 security update patches lockscreen flaw
Apple yesterday released an iOS 7 software update that fixes a security flaw that let users bypass the iPhone lockscreen to access a range of onboard information and online accounts. Read More

Debunking data breach myths
Most of the perceived reasons for data breaches are myths. Let's break them down. Read More


WEBCAST: Dell VMware

A Data Protection Guide for IT Leaders in Media
What if you could restore your data quickly, shrink backup windows and save without creating risk? Learn how IT leaders within media are providing end-to-end protection of their data stored across physical, virtual and cloud environments through an open, scalable and affordable approach. View Now

Brute-force malware targets email and FTP servers
A piece of malware designed to launch brute-force password guessing attacks against websites built with popular content management systems like WordPress and Joomla has started being used to also attack email and FTP servers. Read More

Forget fingerprints: Your iris is your new identity
At the entrance to "The Vault," the most secure room within the most protected building operated by security services provider Symantec, an iris recognition system stands guard as the last line of defense. Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Security industry in 'rut,' struggling to keep up with cybercriminals
Experts agree hackers are winning but some are hesitant to blame it on a lack of new technology, however Read More

7 sneak attacks used by today's most devious hackers
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users Read More

Govt. shutdown threat: IT leaders wrestle with security risks
Federal officials say that their cybersecurity operations won't be disrupted by a shutdown if Congress can't reach a budget deal. However, persistent threats associated with big data, open data initiatives remain. Read More


SLIDESHOWS

iOS 7 tips and tricks you need to learn

Some advice on getting the most out of Apple's new mobile operating system, iOS 7.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco Nexus 9000 aimed at 40G?

2. Replacing silicon with nanotubes could revolutionize tech

3. iPhone 6 rumor rollup for the week ending Sept. 27

4. Cisco iOS updates fix 10 denial-of-service vulnerabilities

5. Free open-source SDN app will analyze your network's complexity

6. Ubuntu impresses in Linux enterprise server test

7. 7 sneak attacks used by today's most devious hackers

8. HP opens up on SDNs

9. Ctl+Alt+Del 'was a mistake' admits Bill Gates, who said 'no' about returning as CEO

10. IBM to pay $44,000 fine over online job listings


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment