Network World Daily News PM | | Through its investment firm called In-Q-Tel, the CIA funds companies, mostly start-ups, to push forward technologies deemed useful to government intelligence agencies. Here are the latest picks to get undisclosed amounts of IQT money; and for last year's summary of IQT picks, check here.To read this article in full or to leave a comment, please click here | | Issue highlights 1. Nadella leaves no doubt about who is in charge in first six months as CEO 2. IBM/DARPA turn out brain-like 5-billion transistor superchip 3. Emerging tech used by Apple, Cisco will frustrate firewalls 4. T-Mobile could soon be bigger than Sprint 5. Security Primer: How malware is classified 6. The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences 7. 10 tech pros who push their downtime to the limits 8. How to fix your Internet connection in Ubuntu Linux 9. The Internet of Things Brings Far-Reaching Security Threats 10. Rackspace clarifies its IaaS message | WHITE PAPER: Juniper Networks This white paper examines these trends, and it reveals the key capabilities that today's security teams require to effectively ensure that vital corporate assets remain secure, while at the same time optimizing access, cost, and administrative efficiency. View Now | He's had his share of hits and misses but he's made his presence felt from the start READ MORE | DARPA-funded IBM researchers today said they have developed a human brain-inspired computer chip loaded with more than 5 billion transistors and 256 million "synapses," or programmable logic points, analogous to the connections between neurons in the brain.In addition to being one of the world's largest and most complex computer chips ever produced it requires only a fraction of the electrical power of conventional chips to operate, IBM and Defense Advanced Research Projects Agency (DARPA) stated.+More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!); The weirdest, wackiest and coolest sci/tech stories of 2013+To read this article in full or to leave a comment, please click here READ MORE | Today's security software is ineffective against an emerging networking technology already in use by Apple for its Siri voice-recognition software, according to research presented at the Black Hat hacking conference this week. READ MORE | WHITE PAPER: HP This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More | Subscriber gains could make T-Mobile the third-biggest U.S. carrier later this year, a new report says READ MORE | The security industry was born at a time when the threat landscape consisted primarily of computer viruses that were spread by floppy disks. Antivirus was the name of the game, and the term "computer virus" was a common topic of conversation everywhere from boardrooms to dining rooms.Today, the threat landscape has evolved immensely. The security industry has grown to address many different kinds of malware and other threats. Accurately describing these threats gives us the ability to discuss them in a common language and can help t raise awareness and educate the general public.In this video we give an overview the major criteria that are used to classify malware – propagation, harm done and resiliency. In future videos we'll describe each of these in greater detail.To read this article in full or to leave a comment, please click here READ MORE | Hacker heavenIt's that time of year again: The wonderful, terrifying week when hackers and security gurus descend upon Las Vegas to show off their skills and unleash presentation after presentation full of scary-sounding exploits. This year is no different. Over the previous week, we've heard tales of planes brought down by rogue code, snoops spying on your security cameras, and secretive, undetectable code that can turn any USB drive into an unstoppable malware vessel.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: MovinCool A new class of self-contained ceiling-mount air conditioners offers a cost-effective solution for cooling server rooms. The compact, space-saving units fit easily above a drop ceiling, have low installation costs, do not require penetration of walls and have no outside condensing unit to maintain. Learn more! | As if IT leadership isn't challenging enough, some tech pros choose not to kick back when the day is done. Here's how flying a stunt plane or birthing a llama can make you a better leader. READ MORE | Ubuntu's included NetworkManager software aims to make your network connections "just work." Nevertheless, sometimes thing go awry. There are times you have to adjust or change your connection settings, especially when using a laptop—just like in Windows.MORE ON NETWORK WORLD: Linux: Best desktop distros for newbies Luckily, you won't have to pull up the terminal and type any arcane commands to make your Internet connection work.To read this article in full or to leave a comment, please click here READ MORE | WASHINGTON – Security pros routinely cite poor cyber hygiene as one of their top concerns. But if they're lying awake at night worried about lazy passwords and software updates going ignored, just think of the headaches that will come once thermostats, pacemakers and just about everything else comes online.When Randy Garrett contemplates the Internet of Things, he sees a colossal security challenge.MORE ON NETWORK WORLD: 12 most powerful Internet of Things companies Garrett, a program manager at the Defense Advanced Research Projects Agency (DARPA), worries that, in the exuberance to embed sensors in a galaxy of devices and bring them onto the network, backers of the Internet of Things will unwittingly create a virtually limitless set of new threat vectors.To read this article in full or to leave a comment, please click here READ MORE | Rackspace still offers IaaS, but only with a support package. READ MORE | WHITE PAPER: Dell Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet to safeguard an organization from today's ever-evolving threats, NGFWs must be able to deliver an even deeper level of network security. View Now | | | | | | | |
No comments:
Post a Comment