Friday, October 31, 2014

Where to find security certifications

Startup Capriza scores $27M to Zapp legacy apps into mobile ones | Google project aims to preserve privacy when collecting software stats

Network World Compliance

Where to find security certifications
Security certificationsThe debate rages on whether gaining security certifications means much. Regardless of whether you think they aren't even worth the paper they are printed on, there are others who believe certifications prove the individual knows what they are doing. With that, here are a group of vendors who offer security certifications.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: bigtincan

The Future of Mobile Design
Effective user experience design is really about crafting deeper connections that enable end-user computing devices to work better together, rather than just coexist. Distributed user experience is about optimizing the user's experience for enhanced productivity when interacting with content across any end-user computing device. Learn More>>

WHITE PAPER: Alert Logic

Best practices for facing today's log management challenges
This whitepaper discusses key best practices to consider when evaluating automated log management solutions. Learn More

Startup Capriza scores $27M to Zapp legacy apps into mobile ones
Capriza, a startup that helps enterprises convert their legacy apps into mobile- and cloud-based ones, Thursday announced it has racked up an additional $27 million in venture funding. That should be enough to help Capriza scale its business on the marketing and sales side, and maybe even have enough left over to afford a drummer and bassist to form a company band (more on that later…). The Palo Alto firm, which started in 2011 and now employs an engineering-heavy staff of about 60 people, has raised a total of $50 million. The latest funding comes courtesy of existing investors Andreessen Horowitz and Charles River Ventures, with Tenaya Capital now joining the party as well. Harmony Partners and Allen & Co., have also chipped in on this round. To read this article in full or to leave a comment, please click here Read More

Google project aims to preserve privacy when collecting software stats
RAPPOR has been released under an open-source license Read More

2014 technology industry graveyard
Microsoft, Google, Intel, BlackBerry and others bid farewell to brands, projects and more. Read More


WHITE PAPER: AT&T

Network-Enabled Cloud: Key Considerations
A network-enabled cloud combines the control, protection, and performance advantages of a private cloud with the economies and elasticity of a public cloud, and seamlessly integrates corporate VPNs with cloud-based resources. Learn more about key Considerations and Partner Selection Criteria in this IDC whitepaper. Learn More

Retain private data for police use or face $685,000 fine, Swedish authority tells ISP
Swedish ISP Bahnhof will fight the order -- and says it has a mysterious Plan B up its sleeve Read More

Senator wants Whisper to explain how it tracks users, shares their data
Reports saying the supposedly anonymous social media app is sharing user information leads to questions from Rockefeller Read More

Best Halloween musical light shows
Techies wire up spooky home light shows to scare/entertain the neighborhood. Read More


WHITE PAPER: HP

Top 5 Truths About Big Data Hype and Security Intelligence
Big Data Security Analytics (BDSA) is the subject of exuberant predictions. However, a Gartner analyst points out that no available BDSA solutions come close to these forecasts. Nevertheless, the principles of Big Data are the key to advanced security intelligence. This white paper discusses the key tenets of Big Data. Learn more >>

Drupal: If you weren't quick to patch, assume your site was hacked
Drupal site owners who failed to rapidly deploy a recent critical patch were advised to restore their sites from backups Read More

How to figure out if a data breach is a hoax
Deloitte has published ways to figure out if an organization has really been breached Read More

Open source and free software graveyard, 2014
The good thing about open source projects getting killed off is that there always seems to be another to take its place. Here’s a look at this year’s carnage to date, including some free software and freeware. TrueCrypt disk encryption The managers of the TrueCrypt open source encryption file and disk encryption software project shut down their effort in May, noting that development was ended after Microsoft curtailed Windows XP support. The tool, for Windows, Mac OS X and Linux, has been widely used by professionals and consumers to keep sensitive data confidential via on-the-fly encryption. TrueCrypt’s project team offered recommendations for transferring encrypted data to other programs, such as Microsoft BitLocker.To read this article in full or to leave a comment, please click here Read More

Gigamon says it can analyze attacker SSL traffic without hitting performance
Attackers are increasingly using SSL to encrypt data they steal, which poses challenges for security Read More

In search of killer meetings
I’ve been thinking a lot about in-person/virtual meetings lately: Whether they should largely be killed off along with other outmoded things like musicals and namifying, or whether they should be allowed to live and thrive in a new and better format.Having spent two productive days this week in Boston at my parent company’s annual meeting learning from and sharing with my colleagues as well as outsiders from around the world, I have no doubt that in-person gatherings still very much have their place. Exposure to the media, marketing and mobile experts there all gave me a broader perspective on what’s shaping the IT and publishing industries. To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

Ubuntu turns 10: A look back at the desktop Linux standard bearer

A brief history of Ubuntu, as alliterative as all-get-out.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Tim Cook: 'I'm proud to be gay'

2. Cisco, others pushing 2.5G, 5G Ethernet

3. What it's like living on a Chromebook, Part 1

4. FBI: List of purchase order scam victims growing rapid

5. Microsoft 'almost' wraps up largest layoff

6. Lowe's ranked the best, Home Depot the worst in SECTF contest

7. Stealthy malware uses Gmail drafts as command

8. Windows 7 sales end this Friday

9. Internet2 slices network

10. Getting chipped: Why I will live with an NFC chip implant for a year


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment