Thursday, October 29, 2009

Juniper lays out 'New Network' initiative; 12 biggest data breaches of the past 12 months

12 biggest data breaches of the past 12 months; Smartphone etiquette: Five unspoken rules
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Qwest
rule

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.

Read More

rule

Spotlight Story
Juniper lays out the pieces of 'New Network' initiative

In what the company is billing as its most significant announcement since its 1997 founding, Juniper Networks today unveiled a flurry of products, processors, software and partnerships designed to drive the direction of enterprise and carrier networks into the next decade. Read full story

Related News:

12 biggest data breaches of the past 12 months
Americans' confidential information is being exposed left and right because of the usual culprits: criminal activity, insufficient security and simple carelessness. Here are the 12 biggest data breaches in the United States from the past 12 months.

Smartphone etiquette: Five unspoken rules
Toilet texting. Tweeting in church. What are the do's and don'ts for smartphone users?

Pink Tech for the Cure
As Breast Cancer Awareness month winds down, we look at some pink gadgets that you can pick up at the last minute.

Bug Forces RIM to Pull BlackBerry Enterprise Server 5.0 MR3
BlackBerry maker RIM has removed the latest maintenance release for its BlackBerry Enterprise Server (BES) software for Lotus Domino. The update reportedly introduced a bug that could cause BlackBerry users' past filed messages to be mistakenly moved back into their inboxes.

News podcast: Network World 360
A U.S. law that would require businesses to report data breaches to potential victims could help law enforcement agencies fight the growth of cybercrime, an FBI official said Wednesday. Also, Novell is seeking a 90-day stay from a federal appeals court so it can petition the U.S. Supreme Court to review a decision in its ongoing case against SCO that reversed a ruling affirming Novell's ownership of Unix copyrights. (5:56)

Verizon Droid: 5 Standout Features
Well, gang, it's official: Verizon's Motorola Droid smartphone is on its way into the world. The Droid, unveiled Wednesday, will hit store shelves on November 6 with a $199.99 price tag, after a $100 mail-in rebate and with a new two-year contract.

Droid vs. iPhone: The Scorecard
Motorola's Droid, available next week from Verizon, has generated the most excitement of any smartphone since Apple's introduction of the iPhone. How do the two compare?

Amazon downplays report highlighting vulnerabilities in its cloud service
Amazon today said that it has taken steps to mitigate a security issue in its cloud computing infrastructure that was identified recently by researchers from MIT and the University of California at San Diego.

Net Neutrality Fears: Big Telecom or the FCC?
Net netutrality is a case of who you fear most: Evil telecom companies or the evil FCC? Companies are unlikely to behave without the threat of FCC action, but if the FCC acts we may wish that it hadn't.

Keeping Control of the Cloud
Cloud computing makes auditors cringe. Enterprises say it was hard enough to make virtualization "palatable" to auditors; cloud is going to be even harder. By breaking the links between hardware and software, virtualization liberates workloads from the physical constraints of a single machine. Cloud takes that a step further, making the physical location irrelevant.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

 

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Daily Server News
This resource center is updated daily with the latest server news and contains a weekly blog from our server expert and contributing editor, Deni Connor. It also contains a collection of valuable resources including IDC White Papers, HP Guides and data sheets, and more!
Bookmark this page


Top to Bottom Performance Management Excellence at the City of Chicago
In this featured City of Chicago case study, learn how the City's performance management efforts leveraged BIRT Performance Scorecard to: Save $10 million by improving their management of Overtime through Performance Management, break down departmental silos by facilitating cross-communication and consolidating financial payment processes and unify the performance management efforts of 36 city departments. Attend this web seminar to receive a complimentary copy of the City of Chicago case study.
Click here to register today.

 

October 29, 2009

MOST-READ STORIES

  1. Motorola Droid vs. Apple iPhone 3GS: finally, a contender?
  2. They're kicking our butts at Trivial Pursuit
  3. 12 mad science projects that could shake the world
  4. Microsoft Linux: Why one free software advocate wants it
  5. Password Reset Email is new Facebook virus
  6. Internet phone systems become the fraudster's tool
  7. Verizon's Motorola Droid arrives Nov. 6
  8. Tech: 9 things I still hate about you
  9. Verizon fires shot across iPhone's bow with Droid smartphone
  10. EFF fights 'censorship' with Takedown Hall of Shame

Laptop Security Redefined
A laptop for "the whole team," that's what Lenovo created with the new ThinkPad T400. It takes thin and light to a new level, but even more compelling; it creates a new standard for laptop security. Lenovo provides manageability to remotely manage PCs for the diagnosis, isolation and healing of threats even when the PC is powered down. There's also a "poison pill" to deactivate a stolen notebook even if it's off the network.
Learn more.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

 

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 

 

No comments:

Post a Comment