Search This Blog

Friday, February 24, 2012

Juniper buys web security company for $80 million

Apple's Gatekeeper: A low cost for partial security | 5 free Android security apps: Keep your smartphone safe

Network World Compliance

Forward this to a Friend >>>


Juniper buys web security company for $80 million
Juniper said this week it has acquired Mykonos Software, a provider of website and web application security software, for $80 million. Read More


WHITE PAPER: Quest Software

Want to Make Compliance Easy? Get Proactive!
Is your business reactively implementing compliance? If so, you're wasting time and money and destroying productivity. Get proactive! In this Quest white paper, see how centralized monitoring and reporting is more secure, saves money and helps you adapt and manage compliance needs today and tomorrow. Read Now!

In this Issue


WHITE PAPER: Raritan

Why Managing VMs is So Complex
Because virtual servers coexist with nonvirtualized ones, it effectively doubles the tools and efforts relevant to data center administration. Discover how a unified, out-of-band approach that aggregates management tools into a single, consolidated platform, renders the virtual and physical layers transparent from an IT management perspective. Read now!

Apple's Gatekeeper: A low cost for partial security
Out of the blue, Apple just announced Mountain Lion, the next generation of its OS X operating system. By the time Mountain Lion ships sometime next summer, Apple says it will have lots of new features, some transported from its iOS environment of the iPhone, iPad and iPod Touch world. This column will examine just one of the new features, one that, while good, has not yet included all the functions of its iOS prototype. Read More

5 free Android security apps: Keep your smartphone safe
There's been much controversy over mobile OS security, especially where Android is concerned. With 47% of the smartphone market in Q4 of 2011, according to ABI Research, it's no wonder that Android is getting attention. Read More

FCC chairman calls on ISPs to adopt new security measures
U.S. Internet service providers should take new steps to protect subscribers against cyberattacks, including notifying customers when their computers are compromised, the chairman of the U.S. Federal Communications Commission said Wednesday. Read More

The ultimate tips box
Got problems with insider threats? Need help securing your wireless LAN because of employees bringing their own devices on to your network? Know how to protect your Android device? Read More

White House pushes for new privacy codes of conduct
The U.S. White House will push for online businesses to adopt new privacy codes of conduct, including consumer rights to control what information websites collect about them and a right to see what data is being collected, officials there said. Read More


WHITE PAPER: HP, Microsoft & Intel

HP reference configuration for Premium OLTP
Learn more Learn more

Lieberman: Cybersecurity Act of 2012 will help us protect critical infrastructure
At a hearing on the bill, witnesses and senators said fast action is necessary to protect critical infrastructure against certain attack. The bill's sponsor promised there's no hidden SOPA-PIPA language in the legislation. Read More

Zettaset to offer role-based access control for Hadoop
Zettaset, which makes tools for managing big data, has unveiled its SHadoop security initiative to help companies better control access to data in Hadoop. Read More

Researcher: 200,000 Windows PCs vulnerable to pcAnywhere hijacking
As many as 200,000 systems connected to the Internet could be hijacked by hackers exploiting bugs in Symantec's pcAnywhere, including up to 5,000 point-of-sale programs that collect credit card data, a researcher said today. Read More

IBM makes QRadar security event management product more intelligent
IBM is widely expanding the intelligence gathering functions available to its security-event management (SEM) product, QRadar Security Intelligence Platform, as well as designing a virtual-appliance version of it that works on the VMware platform. Read More

36 state Attorneys General question Google privacy changes
36 state Attorneys General Wednesday questioned Google's decision to change its privacy policies. Read More


WHITE PAPER: NetIQ

First Industy-Wide BSM Maturity Benchmark Study
This first-of-its-kind benchmark study reporting the IT and Business maturity illustrating the business service management imperative today. The survey offers insight into the current and future state of the Business Service Management imperative across global organizations. Learn More

Start-up Click Security debuts with threat-detection product
Start-up Click Security launches today with a threat-detection product that analyzes and correlates intelligence gathered by sensors on network traffic and activity to provide real-time alerts or even automate defense response to network intrusions or other security threats. Read More

Feds request DNS Changer extension to keep 400K users online
U.S. government officials have asked a New York judge to extend an impending deadline that could sever ties to the Internet for hundreds of thousands of users infected with the "DNS Changer" malware. Read More

Symantec: New ZeuS botnet no longer needs central command servers
Cybercriminals are using a modified version of the ZeuS computer Trojan that no longer relies on command and control (C&C) servers for receiving instructions, according to Symantec security researchers. Read More

Aruba simplifies IT management of employee-owned mobile devices
New software from Aruba Networks lets IT groups secure and manage the influx of employee-owned devices to the corporate network. Read More

Qualys CEO: We're ready to take the company public
Qualys, the Redwood Shores, Calif.-based security firm specializing in vulnerability assessment and management, is poised for an initial public offering (IPO) later this year. Read More

Anonymous threatens to DDOS root Internet servers
An upcoming campaign announced by the hacking group Anonymous directed against the Internet's core address lookup system is unlikely to cause much damage, according to one security expert. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 rumor rollup for the week of Feb. 21
  2. Apple's 30th birthday salute to Steve Jobs knocked off YouTube
  3. Cisco: Customers drove us to block Microsoft/Skype
  4. OK Cisco, we get it
  5. Extreme ships 192-port 40G Ethernet switch
  6. Air Force abruptly scraps iPad plan for special ops
  7. FCC chairman calls on ISPs to adopt new security measures
  8. Ubuntu Android add-on designed to replace PCs
  9. Battle of the cheap tablets: Nook Tablet vs. Kindle Fire
  10. The Windows 8 quiz

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: