|
White Paper: Citrix Systems This paper looks at the different security technologies, and the protections that they provide and, perhaps more importantly cannot provide for defending modern web properties against today's cyber threats. Read More ▶ |
While no one thinks security problems will go away, companies are willing to tolerate the risk in the name of agility, flexibility and lower costs. Read More ▶ | |
Goal is rapid discovery of attacks and creating defenses against them. Recently Network World spoke about the hurdles left to get over with Palo Alto's CSO Rick Howard. Read More ▶ | |
Technology vendors and law enforcement agencies need to look for a compromise that allows police to gain access to encrypted devices during criminal investigations, some lawmakers urged. Read More ▶ | |
|
GitHub has a ton of open source options for security professionals, with new entries every day. Add these tools to your collection and work smarter Read More ▶ | |
The OS X command line developer tools include an old version of the Git source code management system that exposes Mac users to remote code execution attacks. Read More ▶ | |
DARPA-funded research team said recently it had developed a tiny component for silicon-based circuitry that could double the radio-frequency (RF) capacity for wireless communications—offering faster web-searching as well as the development of smaller, less expensive and more readily upgraded antenna arrays for radar, signals intelligence, and other applications. Read More ▶ | |
Viber, a popular instant messaging and Voice-over-IP service provider with over 700 million users, has implemented end-to-end encryption to protect its customers' communications against snooping. Read More ▶ | |
The Electronic Frontier Foundation is suing the U.S. Department of Justice over its failure to disclose if Internet companies have been compelled to decrypt user data and communications. Read More ▶ | |
Video/Webcast: EMA Research Join David Monahan, from IT analyst firm EMA, and Wade Williamson of Vectra Networks, live May 24th @ 11AM PDT/ 2PM EDT to learn how to implement high-fidelity security to manage today's most challenging threats, efficiently and effectively. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS Fave Raves: 29 tech pros share their favorite IT products Read More ▶ |
Most-Read Stories |
0 comments:
Post a Comment