Search This Blog

Friday, August 28, 2015

13 big data and analytics companies to watch

DARPA: Current DDoS protection isn't cutting it | More than 80% of healthcare IT leaders say their systems have been compromised

Network World Compliance

13 big data and analytics companies to watch
Investors are piling oodles of funds into startups focused on helping businesses quickly and cheaply sort through enormous data collections of both the structured and unstructured variety. Most of the newcomers not surprisingly have a cloud element to their offerings, leading to every sort of X-as-a-service pitch you can imagine. Here’s a look at some of the hottest big data and analytics companies Read More


WHITE PAPER: Cisco Systems

Cisco ASA with FirePOWER Services
Meet the industry's first adaptive, threat-focused next-generation firewall (NGFW) designed for a new era of threat and advanced malware protection. Cisco® ASA with FirePOWER Services delivers integrated threat defense for the entire attack continuum - before, during, and after an attack. Learn More

: APC by Schneider Electric

eGuide: Data Center Efficiency
In this eGuide, Computerworld, CIO, and Network World examine recent trends and issues related to data center efficiency. Read on to learn how a more efficient data center can make a difference in your organization. Learn More

DARPA: Current DDoS protection isn't cutting it
The DARPA program, called Extreme DDoS Defense (XD3) looks to : • thwart DDoS attacks by dispersing cyber assets (physically and/or logically) to complicate adversarial targeting • disguise the characteristics and behaviors of those assets to confuse or deceive the adversary • blunt the effects of attacks that succeed in penetrating other defensive measures by using adaptive mitigation techniques on endpoints such as mission‐critical servers. Read More

More than 80% of healthcare IT leaders say their systems have been compromised
A survey of IT leaders in healthcare revealed that 81% of them believe their systems have been compromised by at least one malware, botnet or some other cyber-attack in the past two years, placing patient sensitive data at risk. Read More

Smart refrigerator hack exposes Gmail login credentials
A Samsung smart refrigerator designed to integrate Gmail Calendar information has a vulnerability that could allow hackers to steal Gmail user names and passwords. Read More

Tor security concerns prompt largest dark market to suspend operations
Administrators of Agora, the largest online black marketplace operating on the Tor anonymity network, decided to temporarily suspend the website because of possible attacks based on recent methods of exposing Tor Hidden Services. Read More


WHITE PAPER: IBM

Leveraging the Cloud for Your Social Business Workloads
Today, "social business" - a broad term that describes how social, mobile, and other technologies facilitate enhanced employee, customer, and partner engagement - has transformed the way we do business. Read this Frost & Sullivan whitepaper to learn why the cloud is one of the key reasons for this rapid transformation. Learn More

4 security metrics that matter
Today, management demands metrics to get a clearer view of security. Here are four metrics that deliver actionable insight -- and a few others with less value Read More

Microsoft goes back-to-back in winning top networking award
Microsoft Microsoft's Albert Greenberg Last week was a big one for Microsoft's Albert Greenberg: The networking expert delivered the keynote address at SIGCOMM 2015 in London AND received the annual SIGCOMM Award, recognizing lifetime contribution to the field of communication networks.To read this article in full or to leave a comment, please click here Read More

When to host your Website's security
Managing the daily updates and upgrades needed to keep the website secure demands a highly skilled administration team. Read More

Most corporate risk due to just 1% of employees
Just 1 percent of employees are responsible for 75 percent of cloud-related enterprise security risk, and companies can dramatically reduce their exposure at very little additional cost by paying extra attention to these users. Read More


WHITE PAPER: IBM

Information Lifecycle Governance Requirements Kit
Use this requirements kit from CGOC to find the tools and technology you need. Read More.

AT&T Wi-Fi hotspot reportedly stuffs extra ads into Web pages
Stanford computer scientist Jonathan Mayer was recently Web browsing at a U.S. airport when he reportedly noticed there were too many online advertisements. Read More

Wyndham vs. FTC: Corporate security pros need to lawyer up about data breach protection, experts say
Corporate security executives need to meet with their legal teams to find out if the way they protect customer data will keep them out of trouble with the Federal Trade Commission if it should be compromised in a data breach. Read More

Vint Cerf: 'Sometimes I'm terrified' by the IoT
Vint Cerf is known as a "father of the Internet," and like any good parent, he worries about his offspring -- most recently, the IoT. Read More

Middle-aged drivers risking kids' safety by using cell phones in droves
New research finds that most middle-aged drivers use cell phones regularly while on the road, even when kids are in the car. The study ("Distracted driving behaviors related to cell phone use among middle-aged adults"), published in the Journal of Transport & Health and conducted by researchers at the University of California at San Diego, found that the 715 middle-aged drivers surveyed online were especially tempted to take work calls while driving. There was some indication that the older the driver the wiser, as those closer to the top of the 30-to-60-year-old range surveyed were less likely to succumb to distracted driving.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

10 surprising facts about Microsoft

With the release of Windows 10 coming almost exactly 20 years after Microsoft introduced Windows 95, now is as good a time as ever to look at Microsoft's broad impact on the tech industry, particularly the lesser-known facts.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Top 25 computer science colleges, ranked by alumni earning

2. Smart refrigerator hack exposes Gmail login credentials

3. Massachusetts boarding school sued over Wi-Fi sickness

4. Vint Cerf: 'Sometimes I'm terrified' by the IoT

5. 10 surprising facts about Microsoft

6. Amazon Underground offers $10,000 worth of free Android apps

7. 19 free cloud storage options

8. How HP used big data to optimize it

9. Windows 10 is possibly the worst spyware ever made

10. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: