Network World Daily News AM | | Some advice on how to make iOS 8 work for you. | | Issue highlights 1. What corporate security pros should do about Shellshock/Bash bug 2. Apple quickly issues iOS 8.0.2 update 3. INSIDER SDS still young, but very much on the rise 4. Cisco names new security chief after Young departs 5. Forget passwords -- the Nymi wristband uses your heartbeat for security 6. White House blames IT systems for immigration data problems 7. Apple's rotten week: Bent phones, broken software, and shattered security 8. BlackBerry Passport deep-dive review: Qwerty meets quirky 9. Intel investing $1.5 billion in two Chinese chip firms 10. New ad-free social network Ello is pro-privacy, but with caveats 11. Symantec names Michael Brown as new CEO 12. FBI director concerned about encryption on smartphones 13. New products of the week 09.22.2014 | WHITE PAPER: Code 42 Three primary cloud deployment strategies are available today for enterprise software—public cloud, private cloud and hybrid cloud. However, many vendors force enterprises to choose between data security or cloud deployment flexibility; they're either unable or unwilling to give the enterprise both. Learn More | Shellshock/Bash bug exploits can force compromised servers to act as bots and, depending on the types of privileges the servers have, attackers can make them do a lot worse so corporate security pros should patch important affected machines as soon as possible. READ MORE | Late Thursday, Apple issued the iOS 8.0.2 update, which follows quickly on the heels of the flawed-and-quickly-pulled 8.0.1 update that disabled Touch ID and cellular capabilities on the iPhone 6 and iPhone 6 Plus. This latest update not only addresses these issues but reinstates the improvements and fixes initially found in iOS 8.0.1. They include: Addresses an issue where third-party keyboards could become deselected when a user enters their passcode.Fixes an issue that prevented some apps from accessing photos from the Photo Library.To read this article in full or to leave a comment, please click here READ MORE | Anything "software-defined"-- networks, storage, data centers--is grabbing a lot of attention these days. Security is no exception. Software-defined security (SDS) is an emerging model in which information security is deployed, controlled and managed by software. With SDS, security controls such as network segmentation, intrusion detection and access control are automated and monitored via software. READ MORE | Cisco has replaces its security leadership after the departure of Senior Vice President Chris Young.David Goeckeler, a 14 year Cisco veteran, has been chosen as vice-president of the Security Business Group effective immediately. Young has "decided to leave Cisco," according to this blog post from Pankaj Patel, Cisco executive vice president and chief development officer.+MORE ON NETWORK WORLD: Cisco gains strength in next-gen firewalls via Sourcefire code+To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: Guidance Software Forrester Consulting conducted an analysis of the net benefit a global automobile manufacturer realized from the use of EnCase Cybersecurity. The research applied risk-adjusted calculations to the ROI and net benefits experienced in order to provide realistic expectations of the total economic impact that organizations can achieve. Learn more | Imagine one day strapping on a wristband in the morning and then opening your smartphone and laptop without passwords, getting into your car without a key and even boarding a plane without your ID or a boarding pass.That's the future imagined by Andrew D'Souza, president of Bionym Inc., a Toronto-based company working on what he says will be the world's first wearable authentication device.D'Souza talked about the Nymi, which verifies a person's identity using their unique heart beat, at MIT Technology Review's EmTech conference in Cambridge this week.To read this article in full or to leave a comment, please click here READ MORE | The White House has been touting open data initiatives for years. But in one of the most controversial areas in politics -- immigration -- crucial data is often unavailable, and what's available often includes mistakes, say a diverse set of critics.The IEEE-USA is a case in point. The group has been trying for nearly two years to discover how many H-1B visa holders are male. It believes men get as many as 85% of the visas, a percentage that can help explain the lopsided male and female ratios at visa-hiring companies such as Facebook (69% male), and Google (70% male).To read this article in full or to leave a comment, please click here READ MORE | The only magic in Apple land this week is black magic. READ MORE | Let's give it this: BlackBerry's new Passport makes a big impact when you first hold it, thanks to its unusual square shape, its heft and the physical keyboard aimed at keeping its legion of qwerty loyalists happy.BlackBerry no longer discloses how large its installed base of smartphone users remains, but it's probably still in the tens of millions worldwide simply because many older users love having a familiar qwerty keyboard. BlackBerry's first touchscreen phone, the Z10, was introduced in January 2013 and didn't sell well for various reasons, but the absence of a physical keyboard was considered one major factor.To read this article in full or to leave a comment, please click here READ MORE | WEBCAST: Interactive Intelligence The total cost of ownership (TCO) debate between a premises and cloud decision continues to wage on. Depending on how you look at it, it seems that you arrive at a different conclusion. However, the missing factor in nearly all cloud contact center and unified communications TCO discussions is the consideration of buyer risk. Learn More | Intel is investing 9 billion yuan (US$1.5 billion) in two Chinese chip companies with an eye to boosting its presence in the country's booming mobile phone market.The two fabless semiconductor companies develop mobile chipset platforms for smartphones, feature phones and other consumer electronics products, which support 2G, 3G and 4G wireless communications standards, Intel said Friday.The U.S. chipmaker will acquire a minority stake of about 20 percent in a holding company which will own the chip firms - Spreadtrum Communications and RDA Microelectronics.The two chip companies have links to the state. The holding company, in which Intel is investing, is being set up under Tsinghua Unigroup, an operating subsidiary of Tsinghua Holdings, which is a solely state-owned company funded by Tsinghua University in China. Tsinghua Unigroup said in July it had acquired RDA for $907 million.To read this article in full or to leave a comment, please click here READ MORE | The site still gathers certain types of data about users READ MORE | The company is trying to reverse a decline with the slide of the PC market READ MORE | The U.S. Federal Bureau of Investigation is concerned about moves by Apple and Google to include encryption on smartphones, the agency's director said Thursday.Quick law enforcement access to the contents of smartphones could save lives in some kidnapping and terrorism cases, FBI Director James Comey said in a briefing with some reporters. Comey said he's concerned that smartphone companies are marketing "something expressly to allow people to place themselves beyond the law," according to news reports.An FBI spokesman confirmed the general direction of Comey's remarks. The FBI has contacted Apple and Google about their encryption plans, Comey told a group of reporters who regularly cover his agency.To read this article in full or to leave a comment, please click here READ MORE | Our roundup of intriguing new products from companies such as Watchguard and Airwatch READ MORE | WHITE PAPER: Instart Logic For media and entertainment companies intent on delivering high definition web experiences across all devices, web performance can make or break their engagement levels. Learn more>> | | | | | | | |
No comments:
Post a Comment