Monday 19 August 2013

Google to encrypt Cloud Storage data by default

Cisco's 4,000 job cuts won't touch new acquisition Sourcefire | Cybercriminals add new exploit for recently patched Java vulnerability to their arsenal

Network World Security

Forward this to a Friend >>>


Google to encrypt Cloud Storage data by default
Google said Thursday it will by default encrypt data warehoused in its Cloud Storage service. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Powerful and secure remote support with LogMeIn Rescue
For companies that want to compete in their industry, improving the customer experience is a top priority. To do that, having an on-demand remote support solution is essential. That's why companies around the world choose LogMeIn Rescue to provide powerful, secure support of any device, anytime, anywhere. Rescue offers a simple, reliable interface packed with all the features technicians want. Check out LogMeIn Rescue to learn more and start your free trial today.

WHITE PAPER: McAfee

Advanced Malware Nowhere to Hide with a Layered Defense
Smart and malicious advanced malware is targeted stealthy, evasive, and adaptive. Sandboxing and other stand-alone products can't do the job on their own. This editorial brief explains why you need an arsenal of layered, integrated defenses to protect against these sophisticated threats. View Now

Cisco's 4,000 job cuts won't touch new acquisition Sourcefire
Cisco Systems may be "rebalancing" its business by eliminating 4,000 jobs, or about 5 percent of its workforce, but it'll keep its hands off its hot new security acquisition, Sourcefire. Read More

Cybercriminals add new exploit for recently patched Java vulnerability to their arsenal
Cybercriminals were quick to integrate a newly released exploit for a Java vulnerability patched in June into a tool used to launch mass attacks against users, an independent malware researcher warned. Read More


WHITE PAPER: IBM

Security First Insurance
Using IBM Content Analytics and ECM software, the insurer enhances service to policyholders no matter which channels they use to get in touch. Learn More.

Google's Invasions of Privacy, Free But Flawed Products Show Its Arrogance
Google is now admitting that its users shouldn't expect privacy when using Gmail. Meanwhile, a PC OEM says the free Android OS costs more, and causes more headaches, than Windows. Put this together, CIO.com columnist Rob Enderle says, and you have a company that very well may be too arrogant to survive. Read More

10 hottest IT jobs: Developers, developers, developers
It's a job seeker's market, if you've got the right tech skills. IT staffing specialist Modis identifies the 10 hottest IT jobs, based on the skills and roles its clients are eager to find and fill. Read More


WHITE PAPER: Condusiv Technologies

The Top 10 Myths About Recovering Deleted Files
You might be surprised! In this White Paper, many of the common and incorrect assumptions about file protection and recovery are detailed as well as a look Condusiv Technologies' Undelete 10, which fills many of the gaps left by other "recovery" methods. Read Now!

The world's craziest contraband
From bear paws and live pigeons to dinosaur fossils, people try to smuggle the oddest stuff. Read More

U.S. Dept. of Energy reports second security breach
For the second time this year, the U.S. Department of Energy is recovering from a data breach involving the personally identifying information of federal employees Read More

FireEye's multi-vector virtual machine traps attacks before they can do their harm
Today's advanced persistent threats are purpose-built to steal intellectual property and other sensitive data. It takes a next generation purpose-built security solution to detect and stop these kinds of attacks before the perpetrators get what they came for. FireEye's multi-vector virtual machine protects the weakest link in the enterprise: the user at an endpoint. Read More

Red-handed: The 9 ugliest allegations of China-based IP theft
IP theft continues to be a threat to businesses' bottom lines – and a major issue for Sino-American relations. Read More


SLIDESHOWS

15 more useful Cisco sites

In our never ending effort to uncover the most useful sites for Cisco users, we've come up with 15 more!

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 steps for closing the IT skills gap

2. Why Netflix is one of the most important cloud computing companies

3. Hot IT security companies to watch

4. How to solve Windows 8 crashes in less than a minute

5. Top open source network management tools

6. Chambers: Cisco will become the #1 IT company

7. 11 signs your IT project is doomed

8. How CCP handled the biggest multiplayer gaming battle in history

9. 6 highest & lowest paid IT jobs

10. Bloodiest Tech Industry Layoffs of 2013 (so far)


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as buzzhairs@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment