Monday, November 23, 2015

The 'need' to control encryption and The Big Lie

Many embedded devices ship without adequate security tests, analysis shows | NASA: Crayons and cereal help test set baseline for jet engine tests

Network World Security

The 'need' to control encryption and The Big Lie
Within hours of the recent Paris terrorist attacks, various politicians and current- and ex-government officials used it as an opportunity to push ther agendas. For example, in multiple interviews James Woolsey, former Director of the CIA, blamed Edward Snowden, the National Security Agency whistleblower: I think the blood of a lot of these French young people is on his hands ... I would give him the death sentence, and I would prefer to see him hanged by the neck until he’s dead, rather than merely electrocuted. He even went so far as to claim that the Obama administration’s changes to government surveillance policies were responsible for the inability of the US and French intelligence services to prevent the Paris attacks. Talk about a partisan viewpoint.To read this article in full or to leave a comment, please click here Read More


WEBCAST: Box

A Fortune 100's Path to Secure Cloud Enablement
Join a Fortune 100, Box, and partner Skyhigh Networks for a discussion on how we advise our customers through this decision and present a framework for improving your security today. Learn More>>

WEBCAST: Sophos Inc

Hackers Communicate; Your Security Technologies Should Too
It's time to close the gap left open by layered, standalone security tools and share contextual information. Using numerous point products that work in a vacuum no longer provides adequate defense. Learn More

Many embedded devices ship without adequate security tests, analysis shows
An analysis of hundreds of publicly available firmware images for routers, DSL modems, VoIP phones, IP cameras and other embedded devices uncovered high-risk vulnerabilities in a significant number of them. Read More


WHITE PAPER: Level 3 Communications

Cybersecurity - You're Already Compromised
Each year, IT faces an increase in targeted cyberattacks, more sophisticated and prepared attackers, a significant increase in DDoS attacks, and a growing number of hacker toolkits and black market trading sites for stolen data. Learn More

NASA: Crayons and cereal help test set baseline for jet engine tests
One of the most destructive and dangerous materials a commercial or military jet engine can ingest is volcanic ash and one of the least would be crayons and cereal. But those two substances were a key part of testing NASA has been conducting on smart engine sensors that could detect and help pilots avoid a volcanic plume. The new sensors are expected to detect the degradation caused by the volcanic ash, quantify the significance of the event, and aid in identifying which components might require maintenance, NASA stated. Read More


WHITE PAPER: Neustar Inc

10 Cyberthreats Outside the Firewall
Unfortunately for the IT Administrator, security vulnerabilities are not found exclusively in the cyber domain. Here is a list of ten current threats that can cause real damage to an organization's bottom line, brand, and reputation- all of which exist outside of a company's firewall. Learn More

4 simple ways to secure your Internet-connected car
Cars with systems that connect to the Internet are potentially vulnerable to intrusions by hackers. Here are four steps to help protect your automobile without spending a dime. Read More

How tech led to the death of France's public enemy number 1
The suspected mastermind of last week's terror attacks in Paris, Abdelhamid Abaaoud, has died in a police raid. Investigators were led to him by wiretaps and an abandoned telephone. Read More


SLIDESHOWS

Geek-themed Meme of the Week Archive

We find the good ones so you don't have to wade through the mud.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Hottest Black Friday 2015 Windows PC & tablet deals

2. Best Black Friday 2015 Windows deals on PCs, tablets & phones

3. What's going on at Citrix?

4. Cisco updates CCIE, CCNA certifications: What you need to know

5. Windows 10 update deep dive: Big changes, minor tweaks, and early problems

6. Google hires VMware co-founder as cloud chief, aiming for enterprise adoption

7. Anonymous just might make all the difference in attacking ISIS

8. Dell-EMC deal will 'set back innovation,' says Sun co-founder Vinod Khosla

9. Cisco tweaks certs for changing IT landscape

10. 19 free cloud storage options


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


ads

Ditulis Oleh : Angelisa Vivian Hari: 6:13 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive