High-tech

High-tech
Light

Tuesday, March 25, 2014

Free!) Security Tools you should try

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Mar 25, 2014 2:01 PM
Subject: (Free!) Security Tools you should try
To: <aquarianm@gmail.com>
Cc:

The promise of the seamless cloud

Panasonic brings 4K to wearable action camcorders

Network World Daily News PM
March 25, 2014
Share this email

(Free!) Security Tools you should try

Who doesn't like free stuff? There's a long tradition of free or open-source security tools, and one of the best sites to learn more about them is Security Tools, a running list of what it claims are the 125 best free security tools around.

READ MORE
 

Issue highlights

1. The promise of the seamless cloud

2. Panasonic brings 4K to wearable action camcorders

3. Security Vendors Are Racing Toward a New Anti-malware Technology Model

4. SAP rolls out 'smart' new way to do data warehousing

5. Amazon adds search features, more languages to CloudSearch

6. HTC says its One M8 smartphone is like jewelry

7. Info sec industry still struggles to attract women

8. Artificial Intelligence challenge: Could a robot give its own TED talk?

9. Video: What is a rootkit? (Chalk Talk)

10. Best of Interop Finalists Announced, any surprises?

11. New BitCrypt ransomware variant distributed by bitcoin stealing malware

12. Photoshop artists give Bill Belichick his wish

RESOURCE COMPLIMENTS OF: NetBrain

Fighting Network Blindness with Automation

Most network managers struggle to maintain accurate network diagrams. Outdated diagrams are leading to prolonged troubleshooting times, disastrous network changes, and loss of money. Learn how NetBrain can automatically maintain accurate network diagrams for your changing enterprise network. Download White Paper: Applying Automation to Maintain Accurate Network Diagrams

The promise of the seamless cloud

Using the cloud to complement on-premise IT resources is one of the nirvana states envisioned for cloud computing, letting you architect for normal workloads and then burst to the cloud when necessary. READ MORE

Panasonic brings 4K to wearable action camcorders

If you want to record your next climb up a cliff in extreme detail, Panasonic is offering a high-resolution wearable camera that shoots in 4K at 30 frames per second progressive. READ MORE

Security Vendors Are Racing Toward a New Anti-malware Technology Model

While the calendar still indicates that we are in Q1 2014, the security industry continues as a nexus of M&A activity. The year started with FireEye grabbing Mandiant, and proceeded to Bit9's merger with Carbon Black, and yesterday's announcement that Palo Alto's intent to acquire Cyvera. READ MORE

SAP rolls out 'smart' new way to do data warehousing

SAP is continuing to merge its HANA in-memory database platform with its Business Warehouse data warehousing software, with the latest update adding support for HANA's real-time data loading services. READ MORE

RESOURCE COMPLIMENTS OF: SolarWinds

Tales from the Dark Side of the Network

Frustrated with your big IT Network Management System? In this exclusive footage, IT pros tell their side of the story...the dark side. Let SolarWinds ® Software bring light to the darkness. Save Time. Save Money. Save the Network with SolarWinds Network Performance Monitor. Watch now and don’t let inefficient network management systems take your team to the dark side.

Amazon adds search features, more languages to CloudSearch

Amazon Web Services' CloudSearch service has been upgraded with more search features and is now compatible with 33 languages. READ MORE

HTC says its One M8 smartphone is like jewelry

HTC says its latest One flagship smartphone is akin to jewelry, placing it in the market as a premium product set apart from the competition. READ MORE

Info sec industry still struggles to attract women

Even as women have made dramatic advances in medicine, law, and other fields, the proportion of women pursuing undergraduate degrees in the computer sciences has actually been dropping, from around 30 percent in 1990 to 18 percent in 2010, according to the latest data from the National Science Foundation. As a result, according to the Census Bureau, women accounted for just 27 percent of computer science professionals -- down from 34 percent in 1990. READ MORE

Artificial Intelligence challenge: Could a robot give its own TED talk?

Without a doubt the most presentations and presenters for that matter at any given TED conference deliver leading edge material. And now that group - who's tag line if "Ideas worth Spreading" - wants to make them even more advanced by challenging the Artificial Intelligence community to develop a thinking robot to deliver a TED presentation. READ MORE

WHITE PAPER: IBM Corporation

Must-have capabilities for today's warehouse environment

Speed, simplicity and affordability: 3 capabilities businesses need from their warehousing environment. IBM DB2 with BLU Acceleration gives organizations a complete, multipurpose environment to rapidly distill insight from their data, make timely decisions and capitalize on opportunities View Now

Video: What is a rootkit? (Chalk Talk)

The industrialization of hacking has introduced a wave of threats that are increasingly sophisticated, coming from more effective and efficient actors profiting from attacks on IT infrastructure. If you think about it, just 10 years ago we were focused on less sophisticated attacks such as Blaster and Slammer. Over time, we have moved from stopping simple viruses and macroviruses of the 1990s to worms,... READ MORE

Best of Interop Finalists Announced, any surprises?

The Best of Interop Finalists were announced for next week's 2014 Interop Las Vegas show. Looking at the list there seems to be some products and names that did not make the final list. Was there a product and vendor you feel that should have made the list but did not? It will be interesting to see who wins the Data Center Solutions Category, Cisco or Arista? READ MORE

New BitCrypt ransomware variant distributed by bitcoin stealing malware

A new variant of a malicious program called BitCrypt that encrypts files and asks victims for bitcoin payments is being distributed by a computer Trojan that first pilfers bitcoin wallets. READ MORE

Photoshop artists give Bill Belichick his wish

"They can Photoshop me in there," said Bill Belichick in response to chatter about his being the only one of 32 NFL coaches to miss a group photo. And with that Twitter got to work. Here's Pirate Bill. And here's Omnipresent Bill. READ MORE

WHITE PAPER: HP

Mapping security for your virtual environment

With the gaining popularity of virtualization, you need a virtual security solution that allows you to confidently adopt virtualization throughout your data center without compromising on your existing security postures. Read this solution brief to learn more. Learn More

SLIDESHOWS

3D printing: How does it really work?

Here are the nine most common 3D printer technologies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. ATM malware, controlled by a text message, spews cash

2. 3D printing: How does it really work?

3. Cisco's big about-face on cloud services

4. (Free!) Security Tools you should try

5. IP address does not identify a person, judge tells copyright troll in BitTorrent case

6. Dell unveils fabric switch, SDN controller

7. Quitting time: How to make a graceful exit

8. Ubuntu phone isn't important enough to demand an open source baseband

9. 15 (FREE!) security tools you should try

10. Cisco's $1 billion bet on the cloud may pay off

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment