Wednesday, December 2, 2015

Windows 10 update still spies on users

  Feds drive toward high-tech criminal tracking system standard | Tech leaders' boldest predictions for 2016

 
  Network World Security  

Windows 10 update still spies on users
Microsoft's recently released Windows 10 update failed to remove the spying capabilities that privacy advocates thought were disabled. Read More
 


WEBCAST: CloudPassage

You Can Have Your Cloud and Compliance Too
Ensuring compliance has always been a tough job, but its now even harder when GRC teams have to deal with elastic compute infrastructure and ever-changing regulations. Manual processes often slow things down even further. Learn More

WEBCAST: Sophos Inc

Hackers Communicate; Your Security Technologies Should Too
It's time to close the gap left open by layered, standalone security tools and share contextual information. Using numerous point products that work in a vacuum no longer provides adequate defense. Learn More

Feds drive toward high-tech criminal tracking system standard
Electronic monitoring technologies are not the panacea for tracking criminals many believe they are.The main issue – and it's a big one – is that such the packages also known as offender tracking systems (OTS) operate and perform with no underlying industry standards for communications or software causing a myriad of problems for law enforcement agencies.+More on Network World: Gartner: Get onboard the algorithm train!An OTS typically consists of hardware, such as an ankle bracelet, used for collecting Global Positioning System (GPS) signals to determine an individual's location, and software for analyzing data collected from the hardware device.To read this article in full or to leave a comment, please click here Read More
 

Tech leaders' boldest predictions for 2016
Selected responses from Computerworld's survey of 182 CIOs and senior technologists. Read More
 


WHITE PAPER: Entrust, Inc.
 
5 Ways Mobile will Transform Enterprise Authentication
Mobile devices are secure — in fact, more secure than PCs. And their transportability makes them more convenient too. By leveraging mobile devices in your enterprise authentication, you can take significant strides toward both bolstering efficiency and strengthening security. Learn More

IDG Contributor Network: Why you should lawyer up before a cyberattack
Lawyers advise enterprises to establish preemptive legal protection before suffering a cyberattack. While one might expect lawyers to say that, there are some reasons to take this advice.Namely, a federal district court in Minnesota found in October that "certain documents created during Target's internal investigation of its 2013 payment card breach were protected by the attorney-client privilege and work product doctrine," according to the Cybersecurity Law Report.Investigation The court told Target that it didn't have to produce certain documents that the plaintiffs wanted to see. The reason: they were part of the investigation.To read this article in full or to leave a comment, please click here Read More
 

Judge strips redactions from NSL, showing info FBI gets without a warrant
A federal judge lifted an 11-year gag order the FBI had imposed on Nicholas Merrill and removed redactions of a National Security Letter (NSL) so Americans can see the overly broad "types of electronic communications transaction records" that the FBI has sought and continues to seek through NSLs. The FBI served the NSL back in 2004 when Nicholas Merrill owned and operated Calyx Internet Access, a small ISP with about 200 customers. After the judge found in favor of Merrill and not the government, Merrill said, "For more than a decade, the FBI has fought tooth and nail in order to prevent me from speaking freely about the NSL I received. Judge Marrero's decision vindicates the public's right to know how the FBI uses warrantless surveillance to peer into our digital lives. I hope today's victory will finally allow Americans to engage in an informed debate about proper the scope of the government's warrantless surveillance powers."To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: Panduit Corp.
 
Magic Quadrant for Data Center Infrastructure
This new Gartner report reviews 15 vendors of Data Center Infrastructure Management (DCIM) solutions. Based on its own expert analysis and backed up by in-depth interviews with users in the space, Gartner has just published the Magic Quadrant for Data Center Infrastructure Management Tools. Learn More

 

INSIDER
Forecast 2016: 5 fast-track trends to tackle now (and one to ignore)
IT will drive business change in 2016 thanks to key tech developments like cloud computing, security, the Internet of Things, analytics, and the emergence of IT as a change agent.  Read More

 

Flaws in Huawei WiMax routers won't be fixed, researcher says
Huawei isn't planning on patching several flaws in seven models of WiMax routers that are not being supported anymore by the company, according to a security researcher. Read More
 

 

SLIDESHOWS

10 products that big tech companies have open-sourced recently

Releasing internal products to the open-source community is the hip new thing for technology giants to do.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. US Marshals jump into 'Cyber Monday' mania

2. Walmart hired Lockheed Martin for employee surveillance, allegedly got help from FBI

3. Even the CEO's job is susceptible to automation, McKinsey report says

4. 19 free cloud storage options

5. What would the perfect Linux distro look like

6. Looking into the crystal ball of Amazon's cloud future

7. Millions of embedded devices use the same hard-coded SSH and TLS private keys

8. 20 cool things you can do with a Raspberry Pi

9. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac

10. Hottest Cyber Monday 2015 tech deals on Apple, Android, Windows and other products


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


ads

Ditulis Oleh : Angelisa Vivian Hari: 5:54 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive