Friday, October 24, 2014

How the cloud is changing the security game

Best Tech-o-Lanterns 2014 | China attacks lead Apple to alert users on iCloud threats

Network World Compliance

How the cloud is changing the security game
New market of vendors has sprouted up to secure the cloud Read More


WEBCAST: Kaminario

Introducing K2's 5th Generation
The Kaminario K2 is an enterprise-grade, general-purpose, all-Flash storage array designed to work with the mixed workloads of OLTP, analytic and virtualized applications. Watch this 2 minute video to get a quick overview of this high-performance, cost-efficient storage platform, its architecture and enterprise-class features. Learn More>>

In this Issue


WHITE PAPER: Alert Logic

State of Cloud Security Report
In a relatively short time, cloud computing, specifically Infrastructure-as a-Service, has shifted from a new but unproven approach to an accepted, even inevitable, model. Driven by flexibility and efficiency, the question facing most organizations is which applications and workloads to move to the cloud and when. Learn More

Best Tech-o-Lanterns 2014
We've updated our collection of cool, scary and fun pumpkin carvings from around the web, with social media and other topics trending hot. Read More

China attacks lead Apple to alert users on iCloud threats
China has allegedly staged the attack, according to an anti-censorship group. Read More

Startup wants to make cloud attractive for security-sensitive businesses
After three years in stealth, an Andreessen Horowitz-backed, Sunnyvale, Calif. startup named Bracket Computing launched a new computing system today that aims to make the public cloud more palatable to use for security-sensitive enterprises. Read More

Industry can head off IoT privacy rules, former US official says
Connected devices raise new concerns about personal data Read More

FTC appoints privacy researcher Soltani as chief technologist
Soltani has assisted newspapers with investigations of government surveillance and online privacy Read More


WHITE PAPER: AT&T

Network-Enabled Cloud: Key Considerations
A network-enabled cloud combines the control, protection, and performance advantages of a private cloud with the economies and elasticity of a public cloud, and seamlessly integrates corporate VPNs with cloud-based resources. Learn more about key Considerations and Partner Selection Criteria in this IDC whitepaper. Learn More

Anonymous sharing app Whisper under a cloud over user location data
The app is accused by The Guardian of tracking users' locations Read More

FBI director calls for greater police access to communications
Apple and Google should also rethink their plans to enable smartphone encryption by default, he says Read More

OS X Yosemite tips and tricks you need to know
Some tips to get the most out of Apple's new operating system. Read More

Dropbox dismisses claims of hack affecting 7 million accounts
The credentials leaked by an alleged hacker online were likely stolen from other services, the company said Read More

Kmart hacked, exposing customers' card numbers
There is no evidence that personal information or debit-card PIN numbers were stolen, the company says Read More


WHITE PAPER: Wandera

Combat Hidden Threats to Your Mobile Environment
We only hear about the high profile cyber attacks in the news, but what about the every day threats affecting your organization right now? It's likely that you're already the unsuspecting victim of hidden mobile attacks. Find out what practical steps you can take to uncover and neutralize these threats. View now

The Internet is one step closer to universal HTTPs
The Electronic Frontier Foundation (EFF), which is on the front lines for protecting digital freedom and preventing censorship of the web, applauded content delivery network provider CloudFlare for the company's recent announcement that it will offer encrypted HTTPs as its default setting for any website it hosts. Read More

Firedrive mystery deepens -- is this cloud storage site coming back?
Users reach for backups after site stops working Read More

14 tips to secure cloud applications
Enterprises are now clamoring for the corporate security gateway to give way to the new cloud application security gateway. Read More

How to encrypt an Android device in 5 easy steps
Why wait for the Android L to have an encrypted Android device? Here's how to encrypt many Android devices in just five easy steps. Read More

Ubuntu turns 10: A look back at desktop Linux standard bearer
A brief history of Ubuntu, as alliterative as all-get-out. Read More


SLIDESHOWS

How giant companies see the cloud

16 large enterprises talk about their use of the cloud, their plans, challenges they've run into and how they're approaching the skills issues.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Why EMC acquired VCE from Cisco

2. Monumental day for Wikipedia in Poland

3. Google rethinks webmail with Inbox, raising questions about Gmail's future

4. Review: Android 5.0 'Lollipop' is everything I hoped it would be

5. What you'll love and hate about Windows 10

6. OS X Yosemite tips and tricks you need to know

7. USB is now UEC (use with extreme caution)

8. Why do cell phones still suck for calling?

9. Microsoft misses Windows bug, hackers slip past patch

10. Cisco slashing stake in VCE joint venture with EMC


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment