Friday, November 01, 2013

Gartner: Cloud-based security as a service set to take off

Mozilla releases 10 patches, five critical, for Firefox | SMBs suffering from a false sense of security

Network World Security

Forward this to a Friend >>>


Gartner: Cloud-based security as a service set to take off
Gartner is predicting the cloud-based security services market, which includes secure email or web gateways, identity and access management (IAM), remote vulnerability assessment, security information and event management to hit $4.13 billion by 2017. Read More


RESOURCE COMPLIMENTS OF: IT Roadmap 2013

NEW: IT Roadmap Washington, D.C. is all new for 2013!
The content-rich agenda has been redesigned and reenergized to include increased IDG content from editors you know and trust and FIVE FOCUSED PILLARS OF TECHNOLOGY learning that are the most critical for the year ahead. Register now. Attend on December 12th. It's free!

WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Mozilla releases 10 patches, five critical, for Firefox
Mozilla released 10 patches for three versions of its Firefox browser on Tuesday, five of which are considered critical and could be used to remotely install malicious code. Read More

SMBs suffering from a false sense of security
McAfee says that SMBs are suffering from a false sense of security, basing their claims on a recent study conducted with Office Depot. Those who took part in the study showed a high degree of confidence that their data and devices were safe from attackers, despite industry research and evidence that proves otherwise. Read More

FAA sets electronics free on flights – mostly
After years of debate the Federal Aviation Administration today said airline passengers can by the end of the year use portable electronic devices during all phases of a commercial airline flight. Read More

Fake social media ID duped security-aware IT guys
Security experts used fake Facebook and LinkedIn profiles pretending to represent a smart, attractive young woman to penetrate the defenses of a U.S. government agency with a high level of cybersecurity awareness, as part of an exercise that shows how effective social engineering attacks can be, even against technically sophisticated organizations. Read More


WHITE PAPER: Ipanema Technologies

Don't Let App Performance Problems Drag You Down
Check out this exclusive IDG-Ipanema survey to learn about the far-reaching impacts of poor application performance, and what you can do about it. Learn More.

How the IETF plans to protect the web from NSA snooping
Speaking at the UN's recent Internet Governance Forum in Bali, Indonesia, IETF chair Jari Arkko laid out a plan to protect the U.S. Internet from the NSA's surveillance efforts. Read More

Security Chalk Talk: Advanced Firewalls (part 2)
Security Chalk Talk: Advanced Firewalls (part 2) In part 2 of our new security education series (partnered with Sourcefire), we discuss the integration of intrusion prevention systems (IPS) and threat intelligence into today's next-generation... From: Network World Videos Views: 0 0 ratings Time: 05:24 More in Science & Technology Read More

New app gives church's iOS users secure access to corporate files
Egnyte today released iOS and Android apps that let mobile employees work not only with files stored in the vendor's cloud file sharing service, but also now with private files behind a corporate firewall. Read More

Silent Circle, Lavabit unite for 'Dark Mail' encrypted email project
Two privacy-focused email providers have launched the Dark Mail Alliance, a project to engineer an email system with robust defenses against spying. Read More


WHITE PAPER: AT&T

Managing Mobile Access to the Cloud
Use of mobile personal cloud services is proliferating on personal and enterprise-owned mobile devices. Organizations are considering controls that appear to conflict with the spirit of BYOD and wonder if their approach is correct. Learn More

2013 Google Graveyard
One of the great things about Google is that it supplies us with a seemingly never ending list of products, many of them free. One of the most maddening things about the company, though, is that every once in a while it kills off a favorite. Here's a look back at more than a dozen products killed off by Google in 2013. Read More

Experts weigh in with wish lists for Android 4.4 KitKat security
With Android 4.4 KitKat, Google has an opportunity to show that when it comes to security, the next version of the mobile operating system is ready for business. While we don't know whether Google will take up the challenge, security experts provided Wednesday their wish lists of enterprise-pleasing features. Read More

When it comes to troubleshooting and threat detection, NetFlow AND packet capture trump all
NetFlow is great for providing application usage information and can fulfill most organizations' needs for understanding application and service activity, but packet capture solves the most granular end-user problems and is essential when it comes to compliance and transactional analysis. Read More

Gartner: 'Five Styles of Advanced Threat Defense' can protect enterprise from targeted attacks
Attackers want to compromise networks and computers to steal sensitive information from the enterprise by using sophisticated malware. Research firm Gartner says IT can protect the enterprise against targeted attacks in five basic ways, and recommends combining at least two of them together for best effect. Read More


SLIDESHOWS

10 most powerful network management companies

Our look at the biggest players in the network management, um, world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Raspberry Pi as a Network Monitoring Node

2. Cisco to release free standard software to boost Web videconferencing

3. Prosecutor in Aaron Swartz case targeted by 'swatting'

4. Monster bosses: Be very afraid

5. Report: NSA breaks into Yahoo, Google data center links

6. Mozilla releases 10 patches, five critical, for Firefox

7. Coast Guard spills the beans on Google's mystery barges

8. Fake social media ID duped security-aware IT guys

9. Gartner: 'Five styles of advanced defense' can protect enterprise from targeted attacks

10. Microsoft cybersecurity report warns users about the evils of clinging to XP


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment