Search This Blog

Monday, April 19, 2010

Cisco WiFi open to attack

Ask yourself this before dropping that Cisco purchase order | Why Not iSCSI?

Network World Cisco

Forward this to a Friend >>>


Cisco WiFi open to attack
Two researchers have found a range of security vulnerabilities in Cisco WiFi products. They presented their findings at a Black Hat conference this week, according to this report on ZDNet. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: IBM NWW

Overcoming Workforce Disruption
Just because workforce disruptions are unexpected doesn't mean you can't plan for them. Read this study and learn the five critical areas of your business continuity plan where IBM can help you. Read More

Ask yourself this before dropping that Cisco purchase order
Before you opt for a rival's switch due to Cisco's product lead time issues, consider this: Is the switch crucial to your network architecture? Or is it just a tactical low-end/low functionality device for immediate connectivity and not much more? Read More


WHITE PAPER: Microsoft

Extended Security Features of Windows 7
Microsoft has added significant security enhancement to Windows 7. This Gartner research note details the capabilities available (many are only available to EA/SA subscribers), which features should be activated and where some security holes still remain. Read More.

Why Not iSCSI?
Even though FibreChannel over Ethernet gets all the hype, iSCSI over Ethernet is just as capable of converging or unifying data center servers, storage and networking, proponents say. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Cisco Courts SMBs With Additions to Unified Communications
Today, Cisco announced a handful of new additions to its Services Ready Platform, Wireless VPN Firewall, and Cisco 100 Unmanaged Switch lineups aimed at small businesses. Read More

Cisco product delays opening doors for rivals
Continuing product supply constraints at Cisco has some customers waiting months for key Ethernet switches, firewalls and other network gear -- and those who can't wait are turning to competitors. Read More

Why computer science students cheat
Enrollment in undergraduate computer science courses is at an all-time high at colleges nationwide. But this trend that's been hailed by the U.S. tech industry has a dark side: a disproportionate number of students taking these courses are caught cheating. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

10 useful Google Chrome Experiments
Google's Chrome Experiments is a Web site that showcases JavaScript programs which deliver a rich user-graphics experience. To date, there are about 80 projects featured on Chrome Experiments. Here are the 10 most useful.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. 5 hot IT certification picks for 2010
  2. Zombies are open source; humans are proprietary
  3. Apache project server hacked, passwords compromised
  4. Israel bans iPads from America
  5. Windows Phone 7 vs. iPhone: a developer's perspective
  6. Why not iSCSI?
  7. Why hasn't Linux been more successful on the desktop?
  8. 10 things the Internet has ruined and five things it hasn't
  9. 12 "White Hat" hackers you should know
  10. Mystery solved: Why time stands still at 9:42 on iPhone

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: