Thursday 22 August 2013

Can the U.S. Postal Service find a future running a gov't cloud-based authentication service?

Federal courts warn of increased jury duty scams | Government surveillance destroys email privacy so tech & legal site Groklaw shuts down

Network World Security

Forward this to a Friend >>>


Can the U.S. Postal Service find a future running a gov't cloud-based authentication service?
Can the U.S. Postal Service (USPS) find a new future running a cloud-based authentication service for the government? The USPS intends to try and do just that under a three-year $15.12 million contract awarded to SecureKey Technologies today for some foundation technology to build a cloud-based authentication exchange. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Powerful and secure remote support with LogMeIn Rescue
For companies that want to compete in their industry, improving the customer experience is a top priority. To do that, having an on-demand remote support solution is essential. That's why companies around the world choose LogMeIn Rescue to provide powerful, secure support of any device, anytime, anywhere. Rescue offers a simple, reliable interface packed with all the features technicians want. Check out LogMeIn Rescue to learn more and start your free trial today.

WHITE PAPER: Akamai Technologies, Inc.

Develop an Effective DDoS Mitigation Strategy
To lower your organization's exposure to increasing web-based attacks, you need an effective DDoS Mitigation strategy. Download this Forrester Research report to learn how a two-phased approach to protecting your websites and applications can lower your risk. Learn More

Federal courts warn of increased jury duty scams
Another round of scammers using missed jury duty as a way to grab your personal information is making its way around parts of the country, according to a warning issued this week by the US Federal Court system. Read More

Government surveillance destroys email privacy so tech & legal site Groklaw shuts down
There are many ways and varying shades of how a person can be violated—burglarized, mugged, stalked, terrorized, raped—and if you've ever been truly violated, then you feel like you can't get the nightmare scenario stink off of you. Depending upon what happened, it can be a complete mind-screw. You might go to great lengths to make changes in your life in an attempt to assure it never happens again.... Read More


WHITE PAPER: McAfee

Adapt Layered Defenses for Comprehensive Malware Protection
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats. View Now

'League of Legends' account information and transaction records compromised
A portion of the North American user base of "League of Legends" (LoL) had its account information compromised by hackers, according to Riot Games, the company developing the popular online multiplayer game. Passwords and credit card numbers stored in encrypted form were accessed, as well as other details. Read More

VMware, Citrix and Microsoft virtual desktops get encryption security
AFORE Solutions today announced encryption software aimed at securing data in virtualized environments where Microsoft Windows applications are used, including virtualized desktop infrastructure deployments based on VMware, Citrix or Microsoft VDI. Read More


WEBCAST: PC Connection

Cisco Secure BYOD Demo
Join a live demonstration of Cisco Solutions for ensuring you don't lose control while implementing a BYOD policy in your environment. Cisco Identity Services Engine provides a centralized, simple user interface for onboarding devices and enforcing customized security policies. View Now

CSOs: Stop flogging the threats and start providing solutions
I recently chaired a panel on cyberthreats for a local business council. I had great panelists giving details on very sophisticated attacks found in the results of their company's threat reports, along with words from NIST on the security framework effort triggered by President Obama's Executive Order. Advanced persistent threats (APTs) and the Executive Order were dominating the headlines but when I opened it up for questions, most of the audience questions were not about the threats discussed, they were along the lines of "OK, that's nice -- but what solutions have you seen that worked against these things, and how do we convince management they need to fund us to do something?" Read More

'Instagram for PC' application is a marketing scam
An advertisement circulating on Facebook and Twitter for a desktop version of the photo-sharing application Instagram is a scam, according to security vendor Symantec. Read More


SLIDESHOWS

Celebrating Unix heroes

This presentation features the early Unix pioneers and their contributions to the computer industry.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. The last days of Unix

2. 7 IT security skills certifications on the rise

3. Microsoft products you may not know were acquisitions

4. Microsoft dumps ad agency touting Windows 8, Surface

5. 5 reasons you can finally ditch BlackBerry

6. Google gives Chrome mulligan button

7. Next up for WiFi

8. Gartner: Amazon still public cloud leader by a long shot

9. 10 hottest IT jobs: Developers, developers, developers

10. Microsoft's latest screw-ups suggest bigger problems


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as buzzhairs@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment