Search This Blog

Wednesday, April 07, 2010

Is the U.S. the nation most vulnerable to cyberattack?

Botnets 'the Swiss Army knife of attack tools' | 21 critical future NASA missions

Network World Security

Forward this to a Friend >>>


Is the U.S. the nation most vulnerable to cyberattack?
everal nations, most prominently Russia, the People's Republic of China and North Korea, are already assembling cyber armies and attack weapons that could be used to attack other nations. Given that the United States is heavily dependent on technology for everything from computer-based banking to supply-chain tracking and air-traffic control, it's particularly vulnerable to the denial-of-service attacks, electronic jamming, data destruction and software-based disinformation tricks likely in a cyberattack. Read More


WHITE PAPER: Qwest

Connecting to Better Customer Service
Less than a third of surveyed IT executives believe their companies are "highly effective" at adapting to changing customer needs and priorities. Businesses that build a robust voice and data network infrastructure can achieve a high level of responsiveness, and transform customer information and feedback into actionable results. Click here.

WHITE PAPER: Citrix Systems

Tolly Group Performance Report
Tolly Report: "Citrix NetScaler with nCore Outperforms F5 BIG-IP" shows you how Citrix NetScaler beat F5 in head-to-head tests - providing 3X faster Web traffic, lower latency and higher throughput. Learn More!

Botnets 'the Swiss Army knife of attack tools'
Hacker militias may be at the bottom of the cyberwar food chain, but when they want to hit a target, they can mobilize botnets that are already up and running, security experts say. Read More

21 critical future NASA missions
NASA space plans include trips to Mars, Jupiter, Pluto and the Sun as well as climate change operations Read More


WHITE PAPER: Dell

Windows 7 Early Adopter Case Study
Learn how Dell helped a leading business services firm complete an enterprise-wide Windows 7 migration. Learn More Now

Facebook takes steps to deal with gift card scams
Like many other Facebook users Jeff Crites heard of the US$1,000 Best Buy gift-card offer last month from a friend, a Web savvy director of social media at a Fortune 500 company. Read More

iPad security for the enterprise still subject to debate
Whether the iPad is secure enough for enterprise uses is debatable, based on a survey of several analysts and experts. Read More


E-GUIDE: APC by Schneider Electric

5 Ways to Shrink a Data Center
Most data centers can support an average density of 100 to 200 watts per sq. foot. The future of high-density computing – beyond 30 KW - will have to rely on water-based cooling, but is that cost effective? This expert guide discusses the latest energy technologies for today and the future. Read Now.

Estonia readies for the next cyberattack
More than anyone else, Jaak Aaviksoo has first-hand knowledge of what a cyberwar might feel like. In April 2007, Estonia's banking, media and government presence online was disrupted by several waves of distributed denial of service attacks that knocked services offline. The country is heavily wired -- 90 percent of all financial transactions are conducted over the Internet and 70 percent of the population files their tax returns electronically -- so the incident was widely felt by the country's 1.3 million citizens. Read More

In cyberwar, who's in charge?
When the first salvos of cyberwar are fired against the United States, the responsibility to defend the country falls to the president who, aided by advisers from the broad spectrum of government agencies and also the private sector, must feel his way along an uncertain path to decide the appropriate response. Read More

Tech Visionaries and LSD: Turn On, Tune In, Geek Out
While some of the technology industry's brightest minds were inventing the first PCs and developing groundbreaking software, they were also feeding their heads with LSD. Here's a look at nine tech visionaries who's mind-blowing adventures on acid have forever influenced the direction and ethos of the computer industry. Read More

From CyberWar: The Next Threat to National Security and What to Do About It
Cyber war is not some victimless, clean, new kind of war that we should embrace. Nor is it some kind of secret weapon that we need to keep hidden from the daylight and from the public. For it is the public, the civilian population of the United States and the privately owned corporations that own and run our key national systems, that are likely to suffer in a cyber war. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. The iPad as iPod
  2. Cisco launches new servers, switches, SANs
  3. How Google wants to change telecom
  4. iPad as virtual desktop? Citrix says yes
  5. Enterprise cloud put to the test
  6. Microsoft releases desktop virtualization tools for Win 7
  7. Firefox: 30% of the world market
  8. As Windows 7 gains steam, VDI set to rise
  9. iPad teardown reveals first-rate design, build
  10. Slate Wars: 15 tablets that could rival Apple's iPad

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: