Search This Blog

Wednesday, October 30, 2013

Microsoft may turn to Windows Defender for unprotected PCs

Seven essentials for VM management and security | Police are shooting James Bond-like GPS bullets at cars

Network World Security

Forward this to a Friend >>>


Microsoft may turn to Windows Defender for unprotected PCs
Microsoft may eventually automatically turn on Windows Defender for PCs that are left-- deliberately or not--in an unprotected state, executives said Monday afternoon. Read More


RESOURCE COMPLIMENTS OF: Solutionary

Just Released: Solutionary Q3 Threat Intelligence Report
The Solutionary Security Engineering Research Team (SERT) Quarterly Threat Intelligence Report contains results from analysis performed during the third quarter of 2013, focusing on hacktivist activity and anomalous network traffic and providing actionable recommendations for strengthening security. Get your copy now.

WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Seven essentials for VM management and security
Virtualization isn't a new trend, these days it's an essential element of infrastructure design and management. However, while common for the most part, organizations are still learning as they go when it comes to cloud-based initiatives. Read More

Police are shooting James Bond-like GPS bullets at cars
Police in four U.S. states have begun using a new "gun" installed in squad cars that, when activated with a button inside the car, emerges from behind the front grill of the car to shoot GPS tracking devices at vehicles they are pursuing, according to the BBC. Read More

The coolest Air Force UFO videos
National Archives features UFO-related images, interviews Read More


WHITE PAPER: Novell

Mobile Zen: Balancing End-User Productivity and IT Control
Mobility is often seen as a zero-sum game: either end users or IT can win, but never both. Learn how users can have the convenience and mobile productivity they need, while IT retains control over enterprise goods. Victory for both sides. Learn More

NASA: On millions of teeny-tiny copper hairs and orbital debris
Imagine 500 million short copper wires - no longer than the tip of your index finger -- floating in space creating what amounts to an antenna belt that could be used to send messages and conduct other space communications research. That would describe the 1960s era Project Space Needles or Project West Ford as it was sometimes called that NASA and the Massachusetts Institute of Technology last undertook... Read More

Scramble to fix Healthcare.gov site heightens security risks
The ongoing scramble to fix glitches affecting the troubled Healthcare.gov website could heighten security risks and introduce fresh vulnerabilities into an already fragile system. Read More

5 Best and 5 Worst Cities for IT Salaries
Want to know where IT professionals make the highest -- and the lowest -- salaries? We dig into Kforce's 2014 Salary and Employment Guide to see where today's tech workers make the most and the least, the top paying IT roles in each city, and the cost of living for each community. Read More


WEBCAST: HP & Intel®

Cloud Knowledge Vault
According to market research, more than 60 percent of enterprises will have adopted some form of cloud computing by 2013. Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources in this HP & Intel® Cloud Knowledge Vault. View Now

'Joe the IT Guy' video exceeds not-so-lofty expectations
I so expected to hate this video from SysAid's "Joe the IT Guy" that it was all I could do to click the start button. But since I did - and watched all two minutes and 56 seconds, smiling more than once - I figure it's only fair to give you the opportunity to make your own judgment. Read More

Security concerns prompt supoena for Healthcare.gov data
A U.S. House committee chairman, citing security concerns, today ordered a Healthcare.gov contractor to provide detailed information about its work on the project. Read More

Start-up Threat Stack aims to protect Linux-based clouds from hackers
Start-up Threat Stack says it's making its hacker-detection for the cloud software available for controlled beta testing this week, with general availability expected before the end of the year. Read More

That's no poltergeist invading your privacy: Spooky spying hacks make homes seem haunted
Back in the day, 1990s and early 2000s, you didn't hear too much about remote administration tools (RAT), so victims of early RATs like Back Orifice, Netbus or Sub7 would often freak out when the CD-tray would open or close on its own, music files would play for no reason, emails would be snatched from thin air, or files, icons, the clock and task manager would disappear. Read More


SLIDESHOWS

10 most powerful network management companies

Our look at the biggest players in the network management, um, world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Windows 8.1 networking cheat sheet

2. How to more easily upgrade your network to 40/100G Ethernet

3. Juniper unveils new fabric switch, architecture

4. ATM malware may spread from Mexico to English-speaking world

5. EMC accuses rival of 'unfairly' poaching 30+ employees

6. iPhone 6 rumor rollup for the week ending Oct. 28

7. 6 dirty secrets of the IT industry

8. Antigua to legally pirate US copyrighted works

9. Geek-themed Meme of the Week: Not impressed edition

10. 10 most powerful network management companies


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: