Search This Blog

Tuesday, December 07, 2010

Juniper acquires virtualization security firm

Internet Explorer 'protected mode' weakness spelled out | Chinese firm hired Blaster hacking group, says U.S. cable

Network World Security

Forward this to a Friend >>>


Juniper acquires virtualization security firm
Juniper Networks Monday announced it has acquired Altor Networks, a provider of virtualization security for data centers, for $95 million. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Quest Software

Combating Security and Compliance Challenges
Don't wait for a security breach or compliance issue to damage your company. Ongoing monitoring can proactively identify and reduce threats. Learn how you can successfully stop security issues before they become serious problems. Read More

Internet Explorer 'protected mode' weakness spelled out
Researchers have found a chink in Internet Explorer's 'protected mode' security armour that hints at trouble for other Windows apps built around the technology, including Google's Chrome and Adobe's new Reader X. Read More


WHITE PAPER: Websense, Inc.

Buyers Guide to Data Loss Prevention Solutions
This guide provides a list of recommended features and capabilities for buyers to consider when purchasing a DLP solution. Buyers can also use this guide to develop requests for proposals, as well as to help differentiate one vendor's products from another during demonstrations and proof-of-concepts. Read More

Chinese firm hired Blaster hacking group, says U.S. cable
Chinese security firms with ties to the Chinese military have hired hackers, including the group behind the original Blaster worm, U.S. diplomats alleged in a 2009 cable published by WikiLeaks. Read More


WHITE PAPER: Symantec

Next Generation Data Protection
These next generation tools, such as disk based backups, deduplication, virtualization, archiving, and continuous data protection, are essentially revolutionizing the world of data protection. download this whitepaper to find the newest approach to unified data protection. Read now!

7 reasons security pros fail
IT security professionals can enhance their reputations, performance and overall careers by following some simple principles. Read More

EU and US to start talks on personal data security
European Justice Ministers have agreed to work toward an accord with the U.S. on personal data protection. Read More

Enhanced trust and data integrity in the public cloud
If you run applications or store data in the public cloud, what assurance do you have that the service provider is maintaining the integrity of your critical assets? How would you know if a security breach ever happened? Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

December goodies from the Subnets
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Facebook rolls out redesigned profile pages
  2. WikiLeaks' only 'friend' on Twitter could become target, too
  3. Feds tracking Americans' credit cards in real-time without a warrant
  4. Droid 2 phone explodes, bloodies Texas man
  5. 2010's biggest security SNAFUs
  6. Is Apple repeating the same mistake it made with PCs?
  7. Is a next-generation firewall in your future?
  8. Verizon's LTE pricing: Good deal or gouge?
  9. Microsoft gains cloud security certification ... six months after Google
  10. Offshoring blamed in part for IT's jobless recovery

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: