Friday, October 18, 2013

Cisco says controversial NIST crypto – potential NSA backdoor -- 'not invoked' in products

In terms of security, IT execs see no option to BlackBerry | DEMO Fall 2013: SnoopWall shuts the door on mobile hackers and creeps

Network World Security

Forward this to a Friend >>>


Cisco says controversial NIST crypto – potential NSA backdoor -- 'not invoked' in products
Controversial crypto technology known as Dual EC DRBG, thought to be a backdoor for the National Security Agency, ended up in some Cisco products as part of their code libraries. But Cisco says they cannot be used because it chose other crypto as an operational default which can't be changed. Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

In terms of security, IT execs see no option to BlackBerry
The plight of BlackBerry has gotten so bad that heavy satire has stepped in. But IT executives say the absence of a comparably secure alternative is no joking matter. Read More

DEMO Fall 2013: SnoopWall shuts the door on mobile hackers and creeps
DEMO Fall 2013: SnoopWall shuts the door on mobile hackers and creeps At DEMO Fall 2013, Keith Shaw gets a demo of SnoopWall, which lets phone and tablet users turn off port access for apps that might be malware, spyware or other security risks. From: Network World Videos Views: 24 4 ratings Time: 02:33 More in Science & Technology Read More

Hackers steal customer information from PR Newswire
Hackers managed to steal a database containing customer credentials and contact information from PR Newswire, a major press release distribution service that's used by tens of thousands of companies and public relations agencies. Read More

Federal Security Breaches Traced to User Noncompliance
In an effort to lock down agency data and control access points, cybersecurity professionals in the federal government fail to consider the experience of end users, who say security policies are burdensome and often resort to workarounds. Read More


WHITE PAPER: Aruba Networks

10 Steps to Improving the Mobile User Experience
This paper will outline the essential network infrastructure and support best practices necessary to deliver an optimized mobile end-user experience, and offer 10 recommended steps that lead to higher end-user satisfaction. Learn more.

Advanced attackers seen moving to sophisticated hacking technique
Sophisticated attackers could soon adopt an innovative technique for bypassing one of the most effective mechanisms for preventing a Windows security breach, researchers say. Read More

Essential considerations when making changes to security
When it comes to security policies and practices, there are rules (both written and unwritten) that need to be adhered to. An organization simply cannot implement changes to security on the fly as it could lead to disaster. Yet, there are times when changes are necessary, or mandated due to an incident response plan. In that instance, what should business leaders be focusing on? Read More

Apple's claim of unbreakable iMessage encryption 'basically lies,' researchers say
A close look at Apple's iMessage system shows the company could easily intercept communications on the service despite its assurances to the contrary, researchers claimed Thursday at a security conference. Read More

Apple iPhones, iPads get intrusion-detection and prevention from start-up
Start-up Skycure today makes its debut with what's described as intrusion-detection and prevention package for mobile devices. The IDS/IPS from Skycure initially supports Apple iOS iPhones and iPads, with Android anticipated for a later date. Read More


WHITE PAPER: Cisco Wi-Fi Challenge NWW Jun-Aug13

Cisco Connected Mobile Experiences
Whether you are in retail, hospitality, healthcare, transportation, or another industry, keeping and attracting customers is crucial to the success of your organization. Cisco Connected Mobile Experiences can help you improve customer loyalty and increase revenue. Learn more.

Fallout from Snowden leaks could hinder next NSA chief
Whoever succeeds Gen. Keith Alexander as the next director of the National Security Agency will be stuck weathering the fallout from the Edward Snowden media leaks for the conceivable future. Read More

World's craziest Halloween coffins
From KISS caskets to lions and airplanes, a plethora of burial boxes populate the world Read More

20 must-see products at DEMO 2013
DEMO Fall 2013 kicks off this week, giving more than 40 startups and entrepreneurs the chance to introduce their products to the world. Read More

The unsung women of technology
Sure, you've heard of Ada Lovelace and Grace Hopper. But how about Frances Allen, Deborah Estrin or Radia Perlman? Read More


SLIDESHOWS

8 most interesting tech gadgets of 2013

Here's a list of the eight most significant tech gadgets released to date. These aren't necessarily the best selling or most popular, but each stands out for one reason or another.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Remarkable reunion made possible by Google Earth

2. Yes, indeed, Yahoo has that Y3K problem under control

3. 20 must-see products at DEMO 2013

4. Dexter malware kills again

5. Ethernet's 400-Gigabit challenge is a good problem to have

6. 12 drones to own

7. Most parents allow unsupervised Internet access to children at age 8

8. The unsung women of technology

9. Alcatel-Lucent challenges Cisco, Brocade unified access

10. With Windows 8.1, Microsoft seeks redemption of bold, flawed OS redesign


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment