Google plan to thwart government surveillance with encryption raises stakes | Nope, mesh networks won't stop the NSA | |||||||||
Network World Security | |||||||||
Cisco takes aim at security services with new division RESOURCE COMPLIMENTS OF: Check Point Software Technologies What's Hiding in Your Network? Based on research of nearly 900 companies, the Check Point 2013 Internet Security Report uncovers major security risks organizations are exposed to on a daily basis. Discover how often Bots endanger your enterprise. See how commonly-used Web applications can be high risk. And learn how easy it is to experience unintentional data loss. Read the Full Report In this Issue
WHITE PAPER: HP and Intel® Bursting with HP CloudSystem Read this white paper sponsored by HP and Intel® to learn how bursting can bring your business users and IT back into strategic alignment, as you jointly exploit new business opportunities enabled by private, public, and hybrid clouds. Learn More Google plan to thwart government surveillance with encryption raises stakes Nope, mesh networks won't stop the NSA National Archives wants your online vote for iconic American rights exhibit WHITE PAPER: IBM A Smarter Approach to CRM: An IBM Perspective Read this white paper, created in collaboration with Frost & Sullivan, to see how a customer relationship management (CRM) solution can help you respond on the customers' terms. Learn More. Email spam campaign distributes Android scareware "Oddball" asteroid the third largest near-Earth rock -- is really a comet Start-up offers IT security rating system WEBCAST: IBM IBM Intelligent Investigation Manager: Online Product Demo Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more efficient and effective investigations. Learn More. National Cyber Security Hall of Fame inducting five VCs throwing gobs of money at cloud, security, mobile startups Anomaly Detection Lets You Find Patterns in Log Data 15 geeky places to visit before you die | |||||||||
SLIDESHOWS 10 Sorriest Technology Companies of 2013 Microsoft, Apple and Samsung among those issuing mea culpas. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). MOST-READ STORIES 1. Clips from 6 previous iPhone debuts 2. All eyes on the iPhone 5C today 3. Ubuntu impresses Linux enterprise server test 4. Fatal distraction: 7 IT mistakes that will get you fired 5. Mockumentary skewers ISPs as Verizon FCC net neutrality case goes to court 6. The final iPhone 6 rumor rollup: what is Apple likely to do? 7. Cisco catching a falling Big Switch? 8. Security experts question if Google's Chrome Apps is worth the risk 9. Microsoft sticks to guns, will unveil refreshed Surface on Sept. 23 10. 15 geeky places to visit before you die | |||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as buzzhairs@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Wednesday, 11 September 2013
Cisco takes aim at security services with new division
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment