Search This Blog

Thursday, October 03, 2013

McAfee sets sandbox appliance to explode stealthy malware

Shutdown could test IT security at federal agencies | Online "revenge porn" gets a smack-down. More on the way?

Network World Security

Forward this to a Friend >>>


McAfee sets sandbox appliance to explode stealthy malware
McAfee today unveiled a security appliance it calls McAfee Advanced Threat Defense which uses sandboxing technology to open incoming files to safely "explode" them to see if they contain stealthy malware. Read More


RESOURCE COMPLIMENTS OF: Trend Micro

Trend Micro™ Deep Discovery for Advanced Threat Protection
Only Deep Discovery integrates custom sandboxing, adaptive blacklisting, plus C&C detection with email and web gateway, endpoint, and server security—so you can detect, analyze, adapt, and respond to targeted attacks across your enterprise. You get the best threat detection with the deepest cyber intelligence and the lowest security TCO. Protect your information from targeted attacks with the same advanced threat protection solution that Interpol relies on for global investigations. Stop the damage from targeted attacks with Trend Micro Deep Discovery.

WHITE PAPER: Akamai Technologies, Inc.

Develop an Effective DDoS Mitigation Strategy
To lower your organization's exposure to increasing web-based attacks, you need an effective DDoS Mitigation strategy. Download this Forrester Research report to learn how a two-phased approach to protecting your websites and applications can lower your risk. Learn More

Shutdown could test IT security at federal agencies
A government shutdown that lasts more than a few days could test the ability of federal agencies to protect their information systems against security threats. Read More

Online "revenge porn" gets a smack-down. More on the way?
Call it a modern day love story: Boy meets girl; they "like" each other; they privately sext naked pics of each other to celebrate; girl loses interest, breaks it off; guy responds by posting previously private pics to Internet site specializing in revenge; girl has little recourse, suffers much humiliation, ridicule. Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Meet the man behind Silk Road, online drug market seized by FBI
The FBI arrested the proprietor of Silk Road, the industry-leading online black market for buying and selling drugs, in San Francisco yesterday, according to several reports. Read More

'Mr. Sham' patent troll drops lawsuit against Fortinet
Even a non-lawyer such as yours truly could see this one coming, as a patent troll has dropped its lawsuit against security vendor Fortinet rather than press on in front of a California judge who called its alleged Texas office "a sham" and its lone alleged employee there "Mr. Sham." Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Yahoo concerned that release of redacted FISA papers may mislead
Yahoo has asked that it be allowed to review declassified documents of a secret court about a dispute over data collection between the Internet company and the government, as the release of the redacted documents could mislead the public. Read More

Who's Training the Next Generation of Data Scientists?
A projected shortage of qualified data scientists could leave U.S. businesses unable to tap the value of big data. To help meet that demand, the University of California at Berkeley has developed a master's degree program to train new data scientists. Read More


SLIDESHOWS

iOS 7 tips and tricks you need to learn

Some advice on getting the most out of Apple's new mobile operating system, iOS 7.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 12 best places to land a tech job

2. Utility cuts IT workforce, hires Indian outsourcers

3. Cisco's new core

4. 10 encryption tips for the enterprise

5. Ubuntu impresses in Linux enterprise server test

6. Federal government shutdown forces NSF websites to go dark

7. Up to 44% of Americans lie about Googling themselves

8. Apple's 64-bit A7 chip a 'marketing gimmick,' Qualcomm exec says

9. 10 of the dumbest things tech CEOs have said and done

10. HP says open sourcing SDNs is wrong


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: