Search This Blog

Friday, May 01, 2009

U.S. needs transparent policies for carrying out cyberattacks; 20 awesome network research projects

Network World logo

Daily News AM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Citrix
rule

Citrix Minimizing Datacenter Costs
Learn how to slash your server costs by 60%. You'll get valuable information on how Citrix NetScaler helps reduce datacenter costs with server and infrastructure offload.

rule

Spotlight Story
U.S. needs transparent policies for carrying out cyberattacks

By Jaikumar Vijayan
The notion that the federal government needs to create an arsenal of cyberattack capabilities to help defend U.S. interests in cyberspace is gaining considerable support as concerns heighten about online security threats aimed at critical infrastructure targets. But the U.S. has no clear legal or policy framework governing the development and use of such capabilities, the National Research Council warned in a report released Wednesday. Read full story

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

20 kick-ass network research projects
While start-up funding and the emergence of exciting new network startups has fizzled over the past year, research projects at university and other labs continue to sizzle....

Hacker: I broke into Twitter
For the second time this year, a hacker claims to have gained administrative access to a Twitter employee's account.

Netbook pioneer to stick with Windows in 2009
Asustek Computer (Asus) plans to continue using Microsoft Windows OSs in its popular Eee PC netbooks this year despite widespread interest in alternatives such as Google's...

Microsoft gives users Windows 7 free for 13 months
Microsoft will let users run Windows 7 Release Candidate (RC) for more than a year, giving them free use of the new operating system for a significantly longer time than it...

Federal CISOs decry excessive paperwork
Unnecessary paperwork and too much focus on compliance reporting are two of the biggest distractions for federal Chief Information Security Officers trying to shore up...

Network security: What do Britney Spears, the Wizard of Oz and the Dark Market have in common?
Security experts say the darndest things: RSA Conference 2009 brings out the unexpected.

Federal government cloud adoption will triple by 2013, report says
Government agencies are moving slower on cloud computing than the IT industry as a whole, but federal government spending on the cloud will nearly triple by 2013.

Buzzblog: LaserJet turns 25 … "PC LOAD LETTER" still unfathomable
The HP LaserJet desktop printer was a hit the moment it debuted at Spring Comdex 1984. Since then LaserJet has become HP's all-time leading seller, accounting for more than 100 million units. It (and the classic movie "Office Space") also made famous the nonsensical error message "PC LOAD LETTER."

Podcast: Swine flu scare shines spotlight on telework
Chuck Wilsker, president and CEO of the Telework Coalition in Washington, D.C., explains why businesses shouldn't wait for a swine flu epidemic to establish a solid telework program for their employees. (11:01)

Podcast: Movie Madness is NOT Caused by Swine Flu
Keith and guest host Jonathan Summey discuss swine flu mania and malware attacks, possible good news for IT spending, and the return of the Movie Madness prediction contest. (36:22)

Microsoft responds to EU over antitrust charges: let's talk
Microsoft Subnet reports that Microsoft has finally submitted a response to the European Commission over the EC's findings that the company violated antitrust regulations. The company has requested an oral hearing where it will defend itself.

Anxious industry awaits word from Cisco
Will Cisco's projections for Q4 and Q1 2010 inject some optimism into a downtrodden market? Tune in on May 6 when the numbers will be out.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Citrix
rule

Citrix Minimizing Datacenter Costs
Learn how to slash your server costs by 60%. You'll get valuable information on how Citrix NetScaler helps reduce datacenter costs with server and infrastructure offload.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

05/01/09

Today's most-read stories:

  1. What kind of data center can you build with $500 million?
  2. 10 tips for swine flu planning
  3. Microsoft gives server apps virtualization sneak peek
  4. It takes a village idiot: The jerks of online forums
  5. Locking out users gives attackers a tool for DoS
  6. Swine flu threat raises telework questions
  7. Watchdogs smack FCC over E-Rate
  8. Microsoft targets Windows, Linux management
  9. Revving up telework, Obama style
  10. Some IT skills see pay hikes during downturn
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: