Thursday, February 06, 2014

Patching times improved in 2013 as vulnerability battle goes on

US Secret Service: Stronger laws could help fight sophisticated cybercrime | So you think you know networking? Quiz II

Network World Security

Forward this to a Friend >>>


Patching times improved in 2013 as vulnerability battle goes on
Software vendors have improved their response to security flaws in the last 12 months but some still take too long to patch the highest-risk vulnerabilities, figures from Swiss testing firm High-Tech Bridge have suggested. Read More


WEBCAST: VCE

Vblock™ Specialized System for SAP HANA®
Deploy SAP HANA® fast and with low risk. VCE brings together all of the necessary components for SAP HANA® into a single, standardized converged infrastructure system to ensure maximum performance at scale even with high data volumes. Learn More

WHITE PAPER: IBM

How does IBM deliver cloud security?
Cloud computing offers new possibilities and new security challenges. This paper introduces IBM's approach to delivering cloud security for infrastructure services. Learn More

US Secret Service: Stronger laws could help fight sophisticated cybercrime
In the face of the recent Target and Neiman Marcus data breaches the US Secret Service says new laws could help bolster the country's cybersecurity shield. Read More

So you think you know networking? Quiz II
There's a lot to know from Ethernet to Wi-Fi. How much do you know? Read More

Osaka train station set for large face-recognition study
Japan's Osaka Station could become another focal point in the global battle over personal privacy protection as a Japanese research center prepares for a long-term face-recognition study there. Read More


WHITE PAPER: BlackBerry

How BlackBerry Balance Works
BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for you. Learn More

GCHQ reportedly infiltrated and attacked hacktivist groups
British intelligence agency Government Communications Headquarters (GCHQ) has reportedly infiltrated hacktivist groups and used denial-of-service and other techniques to disrupt their online activities. Read More

25 Valentine's Day gifts for geeks at heart
Treat your sweetheart to a Valentine's Day gift with a techie vibe Read More

Suspected data breach at Holiday Inn, Marriott hotels
Lodgers at Holiday Inns, Marriott and Renaissance hotels may have had their payment card details compromised following a new disclosure on Monday of suspected point-of-sale device attacks. Read More


WHITE PAPER: Mitel Networks

Bridging The Communications Gap
Respondents to a recent IDG Research Services survey reveal several gaps between expected benefits and actual realization of those benefits. Learn More

Possible Belarus connection prompts probe of Healthcare.gov
The U.S. Department of Health and Human Services launched a security probe of Healthcare.gov after a U.S. intelligence unit last week warned that portions of the Affordable Care Act website was built by software developers linked to the Belarus government. Read More

More 'Snowden effect': Defense contractors tighten access for IT, security staff
IT and security managers at U.S. defense contractors say the impact of former NSA contractor Edward Snowden as the symbol of the insider threat has led to tighter security in their organizations — and it's often meant they have less access privileges. Read More

DARPA shows off clearinghouse site for open-source code and information
The Defense Advanced Research Projects Agency debuted a new website dedicated to sharing open-source data and publications today, calling it the DARPA Open Catalog. Read More

Google expands bug bounty program, ups Patch program rewards
Google is broadening its bug bounty program for security researchers to encompass all Chrome apps and extensions made by company. It's also upping payments for its Patch Rewards Program, focused on improvements for open-source code. Read More


SLIDESHOWS

Best tools for keeping end users happy

ExtraHop wins Application Performance Monitoring (APM) shootout.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 11 more oddball real-world tech job interview questions

2. 25 Valentine's Day gifts for geeks at heart

3. Meet the real Satya Nadella, Microsoft's new CEO

4. Satya Nadella and Bill Gates's apron strings

5. 11 sure signs you've been hacked

6. OpenDaylight's delayed SDN now available

7. VMware gives some partners the cold shoulder

8. Sleight of hand? Behind Riverbed's Gartner Magic Quadrant leadership claim

9. Tech Salary Guide for 2014

10. SDN start-up ships server-switch product


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment