Network World Security Alert |
| |
|
Check Point has long been known as a firewall company but it is reaching beyond its roots with a new series of protective technologies under its SandBlast line. Read More ▶ |
|
| Video/Webcast: Security Compliance Corporation Automate your entire entitlement review process in 45 minutes. During this fast-paced webinar, we will highlight the speed and simplicity of Access Auditor and Access Manager. In less time than a typical lunch break, we will show how to unwind this cumbersome task. Read More ▶ | “CIOs will participate in the building of a new digital platform with intelligence at the center,” Sondergaard said told a crowd of more than 8,000 CIOs and IT leaders. “The new competitive differentiator is understanding the customer’s intent through advanced algorithms and artificial intelligence. Creating new experiences that solve problems customers didn’t realize they had.” Read More ▶ |
| The DARPA-developed Space Surveillance Telescope (SST) will this week get a new permanent home at the Air Force Space Command where it promises to rapidly bolster the nation’s ability to more quickly spot and track faint objects in space. Read More ▶ |
| | Further from the report: “US Secret Service systems and data remain vulnerable to unauthorized access and disclosure. As discussed, contributing factors included inadequate system security plans, systems with expired authorities to operate, inadequate access and audit controls, noncompliance with logical access requirements, inadequate privacy protections, and over-retention of records. Such deficiencies increase risks to the confidentiality, integrity, and availability of mission- critical information systems and data.” Read More ▶ |
| Wi-Fi router straddles line between consumer-friendly and advanced networking. Read More ▶ |
| Security and systems administrators discuss the best and worst features of log management products such Splunk, ArcSight and LogRhythm. Read More ▶ |
| Richard Stiennon’s book There Will Be Cyberwar is a good read for those interested in the intersection of network-centric warfare and security vulnerabilities. Read More ▶ |
| White Paper: Security Compliance Corporation User access reviews are typically very time-consuming, subject to changing regulations and auditor requirements. We reveal the six most important success criteria for identity governance tools and how to automate this labor-intensive process. Read More ▶ | Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ | SLIDESHOWS 7 Linux command line tools you didn’t know you need Read More ▶ | Most-Read Stories |
|
|
|