Search This Blog

Friday, March 28, 2014

5 free software tools for greater privacy

Network World Compliance - Newsletter - networkworld.com
Consumerization of IT in the Enterprise Starting to Pay Off | New products of the week 03.24.14

Network World Compliance

Forward this to a Friend >>>


5 free software tools for greater privacy
If you use the Internet or a mobile phone, which in modern society is hard to avoid, your personal data and communications are constantly being collected and analyzed. From browsing histories, to emails to text messages, revealing information is sought by a variety of actors, including hackers, government spy agencies and the courts. It's hard to keep up with the new ways information thought to be private is leaking out. But there are a number of companies and volunteers building software tools that provide privacy for users around their electronic communications. And best of all, many of the basic versions are free. 
 Read More


WHITE PAPER: SAS

See the Possibilities Utilizing Data Visualization
Regardless of size, today's businesses are bombarded with structured and unstructured data from a variety of sources. Take advantage of all this data with in-memory analytics and data visualization techniques, to get day-to-day insights for making better decisions. Learn more

WHITE PAPER: IBM

AIIM SharePoint Industry Watch
AIIM surveyed its 65,000 community members to look at how the enterprise is reacting to social aspects, why organizations are exploring social, who is for and against the adoption of social. Learn More

INSIDER
Consumerization of IT in the Enterprise Starting to Pay Off
Businesses are beginning to reap ROI and productivity benefits from consumer technologies such as smartphones and tablets, according to a survey of 1,155 IT decision-makers conducted by IDG Enterprise. Read More

New products of the week 03.24.14
Our roundup of intriguing new products from companies such as Adtran and Malwarebytes Read More

(Free!) Security Tools you should try
Who doesn't like free stuff? There's a long tradition of free or open-source security tools, and one of the best sites to learn more about them is Security Tools, a running list of what it claims are the 125 best free security tools around. Read More

Gameover malware targets accounts on employment websites
A new variant of the Gameover computer Trojan is targeting job seekers and recruiters by attempting to steal log-in credentials for Monster.com and CareerBuilder.com accounts. Read More


WHITE PAPER: HP and Intel® Xeon® processors

HP BladeSystem Leadership and Innovation for Data Centers
In Gartner's 2013 Blade Server Magic Quadrant, HP has been positioned as a leader for completeness of vision and ability to execute. Read this paper to learn why HP BladeSystem is the leading choice of IT professionals. Learn More

Banks' suit in Target breach a 'wake up call' for companies hiring PCI auditors
A lawsuit filed by two banks against Target and Trustwave Holdings, the retailer's security assessor and service provider, could lead to more rigorous evaluations of a company's security for protecting payment card data, experts say. Read More

Security vendor Trustwave named in Target-related suit
Security vendor Trustwave was accused in a class-action suit of failing to detect the attack that led to Target's data breach, one of the largest on record. Read More

Latest Word zero-day similar to exploits in other targeted attacks
Exploits aimed at the recently discovered zero-day vulnerability in Microsoft Word are similar to those used last year by hackers suspected of gathering intelligence for nation states or private companies, a researcher says. Read More

Speedy attack targets Web servers with outdated Linux kernels
Web servers running a long-outdated version of the Linux kernel were attacked with dramatic speed over two days last week, Cisco Systems said on Thursday. Read More


WHITE PAPER: CDW

Are You Prepared for a Software Audit?
Just the word "audit" is enough to make anyone shiver, and when it comes to a software audit, the reaction is no different. A software publisher can exercise its rights to conduct a software audit to check that a customer is using its products in accordance with the End User License Agreement (EULA). View Now

How to avoid becoming a victim like Target
Target's failure to act when alerted that malware was in its network is a reminder that spending large amounts of money on technology is a waste without the right people and processes. Read More

Phishing campaign targets Google Docs, Drive users
Symantec has spotted a phishing campaign leveraging Google Drive that would be hard for users to discern as a scam. Read More

The 10 best free Twitter apps for Android
Sigh…I miss TweetDeck. Nevertheless, these apps are still very good indeed. Read More

Big data, big pay: 10 data jobs with climbing salaries
Compare the salaries, skills requirements and typical duties of 10 data-centric IT jobs Read More


SLIDESHOWS

3D printing: How does it really work?

Here are the nine most common 3D printer technologies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. ATM malware, controlled by a text message, spews cash

2. Melissa virus turning 15 … (age of the stripper still unknown)

3. 5 free Ethernet tools you should check out

4. (Free!) Security Tools you should try

5. FIRST LOOK: The HTC One M8 smartphone

6. Spherix sues Cisco for 'immense' patent infringement

7. 12 signs Apple is bringing an iWatch to market

8. 3D printing: How does it really work?

9. Free data science courses from Johns Hopkins, Duke, Stanford

10. Trial Microsoft software and services - for FREE!


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: