Friday, February 28, 2014

Cloud security concerns are overblown, experts say

Is Your IT Shop a Scrambler or a Leader? | 13 of today's coolest network research projects

Network World Compliance

Forward this to a Friend >>>


Cloud security concerns are overblown, experts say
Security concerns should not deter enterprises from using public cloud technologies when it makes business sense. Read More


WHITE PAPER: IBM

Streamline Data Protection with Storage Manager
IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup and Restore, TSM is a far more comprehensive data-protection solution. Read Now

WHITE PAPER: Crittercism

The 2013 Mobile App Performance Management Report
Most enterprises are looking for ways to leverage their investments in web technology to handle mobile app performance, but between monitoring, OS variants, screen sizes and OEMs, this can be a costly and complex approach. This 2013 Mobile APM Report highlights best practices for meeting mobile app challenges and ensuring mobile app performance. Read more!

INSIDER
Is Your IT Shop a Scrambler or a Leader?
An IT veteran describes the four stages of the technology organization -- and what it takes to move up a notch Read More

13 of today's coolest network research projects
Here's a whirlwind look at some of the wildest and potentially most useful technology research projects from university and vendor labs related to computer networking. Read More

Hot, new products from RSA
Our roundup of new security products on hand at this week's show. Read More

Cloud Service Providers Fight Back, Challenge NSA
Facing a real business threat from the fallout from the NSA's intelligence gathering, tech sector luminaries are expanding their presence in Washington as they lobby for surveillance reforms. Read More


WHITE PAPER: Citrix Systems

The top 5 truths behind what the cloud is not
There's no doubt that cloud is a major paradigm shift for enterprise organizations from the way services are delivered, to the underlying solutions deployed to enable those services. This whitepaper clears the confusion around cloud to help you shape a successful strategy and implementation plan. Learn more

Mac users warned against using public Wi-Fi networks
Connecting to unsecured networks not advisable for Apple users until patch is released for vulnerability Read More

Free tools for Windows Server admins
Read More

Security researchers urge tech companies to explain their cryptographic choices
Fourteen prominent security and cryptography experts have signed an open letter to technology companies urging them to take steps to regain users' trust following reports over the past year that vendors collaborated with government agencies to undermine consumer security and facilitate mass surveillance. Read More

Huge turnout at RSA shows hackers are winning
In the battle between enterprises and malicious hackers, the bad guys are clearly winning, judging by the sheer number of people and exhibitors at the RSA security conference going on here this week. Read More


WHITE PAPER: Crittercism

Performance Management: The Mobile App Development Playbook
This comprehensive 16 page Forrester Research, Inc. report, authored by Jeffrey Hammond, Forrester VP and Principal Analyst, details a number of valuable, commonly collected metrics and describes the tools and frameworks that can help you collect them. Read now!

RSA security attack demo deep-fries Apple Mac components
How bad can cyberattacks get? How about burning the internal components of a machine, whether PC or Mac, to a crisp so there's no thought of it being recoverable? That's what security vendor CrowdStrike showed could be done to an Apple Mac OS X today at the RSA Conference. Read More

Are Apple iOS, OS X flaws really backdoors for spies?
Two recently-discovered flaws in Apple iOS and Mac OS X have security experts openly asking whether the software vulnerabilities represent backdoors inserted for purposes of cyber-espionage. There's no clear answer so far, but it just shows that anxiety about state-sponsored surveillance is running high. Read More

Blackphone plans more secure devices, bouyed by Snowden leaks
Blackphone, the Swiss start-up that's launching a smartphone with encrypted communications, is planning a series of devices around the same idea, one of the company's co-founders said on Monday. Read More

Check Point unveils security architecture for threat-intelligence sharing
Check Point Software Technologies today said it is extending its security architecture to be able to incorporate more threat-intelligence data that could be shared with other vendor partners, with the goal of providing more adaptive prevention. Read More


SLIDESHOWS

Free tools for Windows Server admins

There are endless software tools and utilities out there to help you in managing your network. Here are some of the best free ones.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. RSA security attack demo deep-fries Apple Mac components

2. Google Glass backlash escalates to violence

3. 10 cities that provide 1-Gig internet services

4. No hard feelings, Alan? Ford reportedly will dump Microsoft's Sync

5. 14 Tech Conventions You Should Attend in 2014

6. Ultimate cloud speed tests: Amazon vs. Google vs. Windows Azure

7. Are Apple iOS, OS X flaws really backdoors for spies?

8. 13 of today's coolest network research projects

9. Danger! Danger! iOS update may brick your iPhone 5S or iPad Air

10. Best new technology from Mobile World Congress 2014


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: