Search This Blog

Friday, May 30, 2014

Encryption canary or insecure app? TrueCrypt warning says use Microsoft's BitLocker

Core Infrastructure Initiative to delve into security of OpenSSL, OpenSSH, Network Time Protocol | The hot tech of the cool White House Science Fair

Network World Security

Forward this to a Friend >>>


Encryption canary or insecure app? TrueCrypt warning says use Microsoft's BitLocker
If you attempt to visit truecrypt.org, you will be redirected to truecrypt.sourceforge.net and see, "WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues." Read More


RESOURCE COMPLIMENTS OF: Network World Tech Tours

Wireless Infrastructure Seminar – Magnolia Hotel Houston
Attend and discover how your IT operations can take advantage of exciting new possibilities like cloud-based management, unified wired/wireless management, mobile unified communications, location and tracking services, and more. July 15, Magnolia Hotel Houston. Free seminar. Register Now.

WHITE PAPER: Dell SecureWorks

The CISO's Guide to Advanced Attackers
No matter the size of your organization, advanced cyber-attacks represent a credible threat and risk to your organization. Whether a cybercriminal, disgruntled activist, competitor or nation-state actor, Chief Information Security Officers (CISOs) must address the risk these adversaries pose to their organization. Learn more

Core Infrastructure Initiative to delve into security of OpenSSL, OpenSSH, Network Time Protocol
The Linux Foundation today announced the first protocols that it wants to address as part of its open-source code testing and security review. Not surprisingly, OpenSSL, where the infamous Heartbleed bug was discovered, is among them. Read More

The hot tech of the cool White House Science Fair
Robots, unique apps, virtualization all part of annual White House Science Fair Read More

Vessel-tracking system vulnerable to denial-of-service, other attacks, researchers say
Inexpensive equipment can be used to disrupt vessel-tracking systems and important communications between ships and port authorities, according to two security researchers. Read More


WHITE PAPER: APC by Schneider Electric

Infrastructure Management Software Improves Planning & Costs
This paper demonstrates, through a series of examples, how data center infrastructure management software tools can simplify operational processes, cut costs, and speed up information delivery. View more

Hacking Windows XP to get security patches is a really bad idea
By now, you know about the registry hack trick to get updates for Windows XP. I shouldn't have to tell you this, but that's a really bad idea, one you should not do, and both Microsoft and at least one security firm are saying not to do it. Read More

CISOs taking a leap of faith
If we're lucky, We'll all have a chance once in our careers to take a risk and use our skills and experience to do something we truly love. Sometimes the career risk is low, but sometimes it's truly a leap of faith--one that offers potentially big rewards as well as the risk of major setbacks. Read More

Sophos adds file-level encryption to mobile security software
Sophos has added file-level encryption to its mobile security software so that users of Android or Apple iOS devices with Sophos Mobile Control 4.0 can share encrypted files. Read More


WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

Juniper; Palo Alto settle long-running firewall patent lawsuits
Juniper Networks and Palo Alto Networks today agreed to settle their long-running firewall-related patent infringement lawsuits against each other, with Juniper saying Palo Alto Networks has agreed to pay $175 million in cash and equity as part of the settlement. Read More

Survey Spotlights IT Need to Address Cloud Security
Yesterday data security company Sophos released the results of a survey it conducted on enterprise use of popular cloud-storage services such as Dropbox, Box, Google Drive and OneDrive. Read More

15 hot Kickstarter tech campaigns
Read More


SLIDESHOWS

10 biggest CEO pay raises

Which tech leaders received the most generous pay hikes in 2013?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. The Top 11 Cities for Technology Careers

2. Gartner: Amazon runs away with IaaS cloud Magic Quadrant; Microsoft catching up

3. Hacking Windows XP to get security patches is a really bad idea

4. 10 IT security risks that small businesses can't afford to ignore

5. Juniper, Palo Alto settle long-running firewall patent lawsuits

6. Registry hack enables free Windows XP security updates until 2019

7. Outage caused by single admin mortifies cloud provider Joyent

8. A major mystery behind Microsoft's 'brain-like' speech-to-speech translator

9. 20 best iPhone/iPad games of 2014

10. Teach your router new tricks with DD-WRT or OpenWrt


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: