Tuesday, January 21, 2014

Obama ignored NSA subverting encryption in surveillance reform speech

Quick look: Obama and the NSA morass | Firewall start-up Aorato sniffs out Active Directory anomalies

Network World Security

Forward this to a Friend >>>


Obama ignored NSA subverting encryption in surveillance reform speech
Other than to appease Americans, why did President Obama bother with appointing a Review Group on Intelligence and Communications Technologies if he planned to disregard, or completely ignore, many of the group's recommendations to reform the NSA? Read More


WEBCAST: IBM

IBM Intelligent Investigation Manager: Online Product Demo
Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more efficient and effective investigations. Learn More.

WEBCAST: VCE

Vblock™ Specialized System for SAP HANA®
Deploy SAP HANA® fast and with low risk. VCE brings together all of the necessary components for SAP HANA® into a single, standardized converged infrastructure system to ensure maximum performance at scale even with high data volumes. Learn More

Quick look: Obama and the NSA morass
New rules will limit NSA data gathering, but is the NSA paying attention? Read More

Firewall start-up Aorato sniffs out Active Directory anomalies
Start-up Aorato comes out of stealth mode today with what it calls a firewall designed to protect Microsoft Active Directory shops. Read More

Start-up debuts 'shape-shifting' technology to protect web servers
Backed by a lineup of elite investors, start-up Shape Security comes out of stealth mode today by announcing technology it calls Shapeshifter that is said to prevent cyber-criminals from successfully attacking and compromising websites. Read More


WHITE PAPER: HP and Intel® Xeon® processors

HP StoreOnce Extends its Industry Leadership
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP's new B6200 StoreOnce Backup System versus EMC Data Domain. Criteria considered included scalability (including capacity and performance), high availability, architectural approach, pricing, and licensing. Learn More

30 years of Apple's Mac computer
A visual history of the Mac. Read More

7 More Things NSA Could Be Watching, According to Security Experts
We know the National Security Agency monitors emails and social networks. What else could the NSA be monitoring? Security experts offer their (scary) thoughts. Read More

Location-based services: Controversy at every level
Your smartphone can be a beacon telling the world where you are, with increasing precision. Is that good commerce or bad privacy, or maybe a bit of both? Read More


WHITE PAPER: Red Hat

The Road To Enterprise PaaS
Interested in leveraging automation technologies and a cloud architecture to make developers more productive? Learn how PaaS can benefit your organization to help you streamline your application development, allow you to use existing infrastructure and improve operational efficiencies. Begin charting your path to PaaS with OpenShift Enterprise. Learn more

The 25 worst passwords of 2013: 'password' gets dethroned
"123456" is finally getting some time in the spotlight as the world's worst password, after spending years in the shadow of "password." Read More

Two coders closely tied to Target-related malware, security firm says
A Los Angeles security company has named a second individual living in Eastern Europe whom they suspect coded malicious software that was modified and used against Target. Read More

Spammers buy Chrome extensions and turn them into adware
Changes in Google Chrome extension ownership can expose thousands of users to aggressive advertising and possibly other threats, two extension developers have recently discovered. Read More

10 common misconceptions about security professionals
When it comes to working in security, there are plenty of misconceptions in the public. Many can be blamed on Hollywood, business speculation, and pure imagination.CSO recently spoke to Chris Eng and Chris Wysopal from Veracode, Sanjay Beri from Netskope, and Andrew Wild from Qualys, to get their views on some of the misconceptions about working in and around security. Read More


SLIDESHOWS

The worst data breach incidents of 2013

These businesses and government agencies lost the most personal and financial records due to hackers or security mishaps last year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. This Raspberry Pi Tablet is absolutely gorgeous

2. Encrypted messaging startup Wickr offers $100K bug bounty

3. 14 steps to a better, faster Windows laptop

4. 8 ways that Chrome may be challenging Windows

5. Cisco: Thousands of web hosting centers now launchpads for attacks

6. How to make 96,000lbs of WWII machinery into high-tech research platform

7. 12 toughest U.S. cities for tech recruiting

8. Microsoft Hyper-V bangs away at VMware's popularity

9. SDN will never happen, says VMware exec

10. Juniper announces Firefly Suite for virtual-machine security


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment