High-tech

High-tech
Light

Wednesday, February 19, 2014

The 12 most powerful security companies

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Feb 19, 2014 9:35 AM
Subject: The 12 most powerful security companies
To: <aquarianm@gmail.com>
Cc:

White House defers to FCC on further action on net neutrality

Brett Bilbrey, head of Apple's Technology Advancement Group, retires

Network World Daily News AM
February 19, 2014
Share this email

The 12 most powerful security companies

READ MORE
 

Issue highlights

1. White House defers to FCC on further action on net neutrality

2. Brett Bilbrey, head of Apple's Technology Advancement Group, retires

3. Belkin fixes WeMo security holes, update firmware and app

4. Fujitsu glove uses NFC, sensors to speed hands-free work

5. In win for US, New Zealand court upholds search warrants on Megaupload founder Dotcom

6. Fresh batch of security start-ups aim to safeguard mobile devices, SaaS apps

7. Zeus malware-botnet variant spotted 'crawling' Salesforce.com

8. IBM, AT&T pair to offer 'Internet of things' systems

9. Tech Industry Praises Cybersecurity Framework From White House

10. App uses 'augmented reality' to point way to Japan's elusive free Wi-Fi

11. Sony takes the lead in gaming console race

RESOURCE COMPLIMENTS OF: BICSI

Propel Your Career Today with the DCDC

BICSI’s Data Center Design Consultant (DCDC) Credential gives you the tools needed for multi-faceted application in today’s data centers. A hands-on credential that begins with the design, infrastructure and maintenance planning process, the DCDC gives you BICSI best practices and standards for the ITS industry. DCDC: A BICSI Credential at Your Fingertips. Click for Free Methodology.

White House defers to FCC on further action on net neutrality

The administration of U.S. President Barack Obama said in response to a petition that it continues to back an open Internet, but declined to direct the U.S. Federal Communications Commission on how to go about preserving Internet neutrality, as it is an independent agency. READ MORE

Brett Bilbrey, head of Apple's Technology Advancement Group, retires

Brett Bilbrey retired earlier this month, marking an end to a nearly 12 year career at Apple. During his tenure at 1 Infinite Loop, Bilbrey worked in a variety of positions and on a number of projects, most recently heading up the company's Technology Advancement Group. READ MORE

Belkin fixes WeMo security holes, update firmware and app

If you've made the decision to try home automation and WeMo, then you might have noticed that Belkin WeMo is like a potato chip; you can't have just one. If you try it and like it, then the next thing you know, you have all sorts of WeMo devices. If that describes you, then you were probably a pretty unhappy camper after being told that Belkin chose not to respond about the security holes and therefore... READ MORE

WHITE PAPER: HP

New Style of IT: Am I Ready for SDN?

In this white paper, IDC discusses how having a highly efficient and optimized network infrastructure will properly prepare network operations for SDNs and what role vendor services have when supporting, evolving, and transforming these complex networks. Read Now>>

Fujitsu glove uses NFC, sensors to speed hands-free work

Fujitsu Laboratories has developed wearable technology in the form of a glove and a head-mounted display that could help speed up maintenance work and other applications where NFC tags are widely used. READ MORE

In win for US, New Zealand court upholds search warrants on Megaupload founder Dotcom

A court in New Zealand has ruled that warrants used to search the homes of Megaupload founder Kim Dotcom and his colleague Bram van der Kolk were valid, but objected to the removal to the U.S. by the Federal Bureau of Investigation of copies of the electronic items seized. READ MORE

Fresh batch of security start-ups aim to safeguard mobile devices, SaaS apps

Security start-ups continue to blast out of stealth mode, and among the ones seen this week, the focus is on mobile security as well as cloud-based monitoring and threat detection of software-as-a-service applications such as Salesforce and Box. READ MORE

WHITE PAPER: BMC Software

Six Characteristics of an Effective Solution

Get best practices and real-world examples for using a data delivery system that works with your workload automation solution in this white paper. Learn More!

Zeus malware-botnet variant spotted 'crawling' Salesforce.com

The Zeus Trojan, malware long known to steal banking credentials to siphon off victims' funds, has been spotted being put to yet another devious use: swiping business data from Salesforce.com. READ MORE

IBM, AT&T pair to offer 'Internet of things' systems

AT&T and IBM will start jointly offering services designed to help municipalities, utility companies and other organizations use "Internet of things" technologies to better manage their infrastructure. READ MORE

Tech Industry Praises Cybersecurity Framework From White House

Leaders of the tech sector laud the Obama administration's rollout of voluntary cybersecurity guidelines, but broader private-sector adoption could remain a challenge. READ MORE

App uses 'augmented reality' to point way to Japan's elusive free Wi-Fi

Telecom carrier NTT and navigation service developer Navitime Japan are trying to make free Wi-Fi in Japan easier to find with an app featuring augmented reality (AR) guidance. READ MORE

Sony takes the lead in gaming console race

Sony has sold more than 5.3 million PlayStation 4 consoles as of Feb. 8, solidifying its lead over Microsoft's Xbox One. READ MORE

WHITE PAPER: Crittercism

Getting Agnostic about Mobile Devices

The need for flawless, high-performing mobile apps is critical, yet many organizations struggle. This paper explains how to accurately analyze performance of mobile apps, calculate the cost of app failure, and how to develop, deploy and test mobile apps so that malfunctions don’t happen. Read more!

SLIDESHOWS

The 12 most powerful security companies

Some security vendors just keep getting high marks from independent test organizations and analysts year and year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Whatever happened to the IPv4 address crisis?

2. 16 weirdest places you'll find Linux

3. Experts question security used in Target breach

4. 10-Gbit Google Fiber is already real, just not from Google

5. Windows XP isn't the only software getting the knife in 8 weeks

6. Apple shop maxes out Airport access points, upgrades to 802.11ac

7. iPhone 6 rumor rollup for the week ending Feb. 14

8. Memory glitch hits Cisco's Q2

9. So Long IT Specialist, Hello Full-Stack Engineer

10. Worm 'TheMoon' infects Linksys routers

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment