Search This Blog

Tuesday, June 24, 2014

Gartner: Top trends in IT security technology

Will perimeter firewalls give way to 'RASP'? | New software targets hard-to-understand privacy policies

Network World Security

Forward this to a Friend >>>


Gartner: Top trends in IT security technology
National Harbor, MD. -- Gartner kicked off its annual Gartner Security and Risk Management Summit 2014 by pointing to the top threat challenges heading into next year — and added that in the future, the term IT security will give way to “digital security” to encompass newer challenges, such as the Internet of Things.+More on Network World: Gartner: 7 major trends forcing IT security pros to change | Gartner: The Top 10 IT altering predictions for 2014 | Gartner: Top 10 future strategic IT predictions+To read this article in full or to leave a comment, please click here Read More


RESOURCE COMPLIMENTS OF: Guidance Software

The Impact of EnCase Cybersecurity for Incident Response.
A global automobile manufacturer opened its doors to Forrester Consulting to conduct a detailed study of the benefits realized from the use of EnCase Cybersecurity. The study revealed users can expect: 89% reduction in the time it takes to identify threats and develop remediation plan; 388% return over three years; and a four month payback period. Download the full Forrester report to see the total economic impact that organizations can achieve by implementing EnCase Cybersecurity.

WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

Will perimeter firewalls give way to 'RASP'?
NATIONAL HARBOR, MD -- If the firewall isn’t dead it may be old and sick and not up to the job anymore, while an emerging technology called “Runtime Application Self-Protection” (RASP) could take over most of its duties. That was a matter of debate between two Gartner consultants sparring this morning at the Gartner Security and Risk Management Summit 2014 in National Harbor, Md. Joseph Feiman argued ardently that RASP—described as an instrumentation of runtime in servers or clients to protect applications against attacks such as SQL injection, cross-site scripting and unauthorized access—is basically a better approach than traditional firewalls. Gartner analyst Greg Young, however, raised possible downsides, asking, “Why are we suddenly going to have this magic revolution?”To read this article in full or to leave a comment, please click here Read More

New software targets hard-to-understand privacy policies
The Privacy Icons browser add-on translates websites' privacy policies into nine easy-to-grasp categories Read More


WHITE PAPER: Netscout Systems Inc.

Real-Time Application-Centric Operations Visibility
This EMA whitepaper examines the move towards application/service performance visibility within IT operations, and in particular the network-based delivery of those applications and services and the role that network-based visibility can and should play. Learn More

US intelligence agency wants brain-like algorithms for complex information processing
Getting computers to think like humans has been a scientific goal for years – IBM recently said it found a way to make transistors that could be formed into virtual circuitry that mimics human brain functions. It is technology like that that the Intelligence Advanced Research Projects Activity (IARPA) is looking to develop as well. IARPA, the high-risk, high-reward arm of the Office of the Director of National Intelligence, will next month hold a Proposers Day to explain one of its new projects it says could revolutionize machine intelligence by constructing algorithms that utilize the same data representations, transformations, and learning rules as those employed and implemented by the brain. Read More

Microsoft introduces Interflow: Sharing cybersecurity threats in near real-time
Microsoft announced Interflow, a new platform for sharing cybersecurity threats in near real-time. Although it’s currently available only in “private preview” for Microsoft Active Protections Program (MAPP) members, security threat information will be shared faster, creating a “collectively stronger cybersecurity ecosystem.” In the long run that means protecting people better and more quickly.What exactly does it means to share security and threat information using Interflow? MSRC’s Jerry Bryant said the answer is simple:To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: BMC Software

Meeting the Exploding Demand for New IT Services
In this eBook, explore the top trends driving the New IT for IT Service Management, and how leading organizations are evolving to focus on end-user experience. Learn More

NASA's coolest 'way-out' future projects
NASA’s Innovative Advanced Concepts (NIAC) Program funds what it calls “visionary ideas that could transform future NASA missions with the creation of breakthroughs - radically better or entirely new aerospace concepts - while engaging America's innovators and entrepreneurs as partners in the journey.”  What that the space agency is trying to stay on the bleeding edge with legitimate projects that could one day become real missions or as NASA puts it: Turn science fiction into fact. Take a look at the projects selected this year. These are abbreviated descriptions from NASA, full explanations are available here.To read this article in full or to leave a comment, please click here Read More

Heartbleed patching effort stalls at around 300,000 vulnerable servers
The number of servers vulnerable to the Heartbleed exploit decreased by only around 9,000 in the past month, a recent scan shows Read More

As iPhone thefts drop, Google and Microsoft plan kill switches on smartphones
After a year of pressure, U.S. law enforcement officials announce a major success in their phone anti-theft push Read More

Chinese site in signal-jammer sting could pay record $34.9M FCC fine
The company allegedly told US shoppers some of its illegal jammers were FCC-approved Read More


SLIDESHOWS

5 potential Facebook killers

Outside of the obvious suspects – LinkedIn, Twitter and Google+ – who has the potential to unseat Facebook? Here are five possibilities.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 8 technologies that are on the way out -- and one that we'll never be rid of

2. First look: Amazon's new Fire Phone

3. Google develops own 'boring' version of OpenSSL

4. It's not time for Cisco CEO John Chambers to retire

5. Goodbye stupid software patents?

6. Review: Open source proxy servers are capable, but a bit rough around the edges

7. 3 steps for moving Cisco's Catalyst 6500 to the Nexus

8. 7 tips for protecting your AWS cloud

9. Facebook reveals a homegrown SDN data-center switch

10. Google looks to the day when it can quit building its own servers


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: