Search This Blog

Tuesday, June 09, 2009

Top urban legends in IT security; Microsoft's dizzying array of virtualization options; iPhone vs. Pre

iPhone 3G vs. Palm Pre; Cisco losing share across the board: analyst
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile


Sponsored by IBM
rule

Learn how telecomm providers can deliver optimal service quality
Telecommunications services are becoming more and more complex. They now run over virtual network paths, less constrained by individual pieces of hardware. Get this white paper and see how service quality management solutions from IBM can improve the customer experience.

rule

Spotlight Story
2009 Top Urban Legends in IT Security

Heary: There are lots of IT Security related urban legends floating around the Internet. Some have malicious intent and others are just for fun. Some have been with us for years but still refuse to die. Here is a list of my top IT Security Urban Legend picks for this year. Read full story

Related News:

A guide to Microsoft's dizzying array of desktop virtualization options
Microsoft offers no fewer than five desktop virtualization technologies -- depending on how you define the term. We chart the options.

iPhone 3G vs. Palm Pre
Does Palm Pre knock the iPhone 3G off its design throne? We take a look, side-by-side.

Cisco losing share across the board: analyst
Cisco lost share across several markets in Q1, most dramatically in SANs, according to investment firm UBS. The firm suggests the backwards steps might be due to company distraction.

Cheerleader for new domain names defends ICANN plan
Plans to introduce new top-level Internet domains will not force trademark owners to make defensive registrations to protect their brands, according to two reports published by ICANN on Saturday.

Verisign urges careful check of cloud security
SAS 70 - the auditing standard used by CPAs to evaluate the processing of transactions - is emerging as one of the key ways to evaluate cloud service provider security.

The need to consider a router's power efficiency metrics
At the recent Interop conference, Jim moderated a highly interactive panel that was entitled "Is Routing Undergoing a Mid-Life Crisis?" This is the third in a series of newsletters that is based on that panel and which continues the discussion of routing and the identification of what if anything is driving the need for IT organizations to rethink their approach to routing.

Internet Cleanroom: New weapon against drive-by download attacks emerges
As more employees visit social networking sites while at work, network managers are seeing a rise in accidental malware infections known as drive-by download attacks.

White House plan to create 600K jobs in 100 days won't help tech
The impact of the nearly $800 billion stimulus package on shrinking IT employment remains in the future, despite President Obama's plan to expedite hiring of some 600,000 people over the next 100 days.

Social Engineering: 5 Security Holes at the Office
If you think the biggest threat to your sensitive information lies in network security, think again. Once a criminal is inside a building, there are limitless possibilities to what that person can access or damage. Take a look at your building's security. How easy is it to get inside?

Social Engineering: The Fine Art of BS, Face to Face
Social engineering expert Chris Nickerson reveals what criminals are looking for when it comes vulnerabilities in building security.

June Giveaways

Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.


Windows 7 + Windows Server 2008
Evolution of EthernetWe found 5 things to love and 5 things to hate about Microsoft's latest operating system versions.

Open-source management
Apple iPhoneys: The 4G editionHere are nine management apps that won't break the bank.

Improve operational efficiencies with next-gen networks and services
There has never been a better time for service providers to streamline operations, improve responsiveness and reduce costs. Find out in this white paper how all three can be accomplished with IBM Tivoli® Netcool® solutions. Also discover methods to boost efficiency and minimize expenditures.
Learn More


 

June 09, 2009

TOP STORIES | MOST DUGG STORIES

  1. New DOS attacks threaten wireless data networks
  2. 2009's summer smartphone blockbusters
  3. Cisco's take on 4G: It's all about video
  4. Juniper claims first with 100G Ethernet
  5. CIOs: Your networks have already been compromised
  6. T-Mobile net reportedly hit by hacker/extortion attack
  7. Bing vs. Google vs. Yahoo: Feature smackdown
  8. FTC shuts down notorious ISP
  9. Five things we love/hate about Win 7/Windows Server 2008 R2
  10. Nvidia overcomes bad graphics chips

Everything you need to know about Storage
Visit this site to learn of newest storage advancements, issues and product announcements - issues such as Fibre Channel over Ethernet and whether vendors' plans for the technology make sense. The site includes a weekly blog, briefs on storage technologies and products, and links to stories on IDG's sites about storage.
Everything you need to know about Storage



Inbox too cluttered?
Take our survey to help us improve how IT professionals get the information they need.
Click to take our survey


IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: