| Comcast to start encrypting email traffic with Gmail in the coming weeks | GnuTLS library flaw could expose SSL clients, systems | |||||||||
| Network World Security | |||||||||
| | Researchers urge hackers to exploit Hyper-V's huge attack surface WHITE PAPER: Dell SecureWorks Advanced Threat Services This white paper defines advanced threats, reviews the types of techniques advanced threat actors use as they relate to the kill chain, recommends specific steps for an effective defense strategy and defines how Dell SecureWorks services can help organizations detect, defend and eradicate advanced threats. Learn more In this Issue
WEBCAST: Dell SecureWorks Counterstrategies for Combatting Social Engineering Social Engineering is proving costlier than ever, especially phishing and spear phishing. With recent breaches, the imperative to counter social engineering effectively takes on a whole new level of urgency. In this webcast, the CISO for Dell SecureWorks discusses the realities of social engineering and what your organization must do to counter it. Learn more Comcast to start encrypting email traffic with Gmail in the coming weeks GnuTLS library flaw could expose SSL clients, systems WHITE PAPER: Damballa Big Data Helps Defend Against Breaches The prolific number of advanced threats makes it impossible for security teams to keep up. Automating detection and response is necessary to stay ahead of attackers. Big data analytics is a future-proof foundation for outlasting the cyber security malware arms race Read More Meet the future of computing: 10 killer hardware advancements from Computex 2014 10 hot cloud computing skills WHITE PAPER: RES Software Beyond the Enterprise App Store Leverage proactive, secure and automated IT Service delivery to move beyond the traditional App Store and empower your users. Read the white paper to learn how Learn more Enterprise security monitoring weaknesses telegraph lots of future cybersecurity opportunities Gazzang buy gives end-to-end encryption for Cloudera Hadoop | | |||||||
| SLIDESHOWS 15 more weird things in the Internet of Things The Internet of Things is growing, and the things are getting weirder by the day. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). MOST-READ STORIES 1. TrueCrypt's abrupt demise 'puzzling, bizarre' 2. Apple's coolest announcements at WWDC 2014 3. Apple's rumored iWatch to feature a round face 4. SDN seen slowing spending on routers, switches 5. 10 Google Glass Etiquette Dos and Don'ts 6. iOS 8: Way more open to your world 7. Sprint union with T-Mobile reportedly a done deal 8. Lockheed lands $915 million to begin space fence 9. A first: Microsoft pulls in more from enterprise collaboration than Cisco 10. Microsoft's translation app for Skype is seriously impressive | |||||||||
| Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** | |||||||||
No comments:
Post a Comment