Tuesday, March 08, 2011

New security tools protect virtual machines

The DDoS Hall of Shame | SSD Security Issues Surprise Experts

Network World Security

Forward this to a Friend >>>


New security tools protect virtual machines
As enterprises move towards virtualizing more of their servers and data center infrastructure, the security technologies that are plentiful and commonplace in the physical world become few and far between. Read More


WEBCAST: Trend Micro

Deep Security with Trend Micro
Watch this video of users of Trend Micro Deep Security and hear how it is ensuring regulatory compliance and preventing server, desktop and cloud data breaches. View now!

WHITE PAPER: CA

Next-Generation IAM
Traditional IAM does not ensure the protection required for adequate security nor does it provide the flexibility needed today. Next-generation IAM enables IT to better control and secure identities and their access rights and goes further by controlling how sensitive information is communicated. Read Now

The DDoS Hall of Shame
Distributed denial of service (DDoS) attacks like the ones that nailed WordPress blogs in early March have been around for decades, but it's only in the last dozen years that they've had enough impact  to grab public attention. Read More

SSD Security Issues Surprise Experts
Many storage and security experts were surprised by a UC San Diego study that found that solid-state drives are harder to erase than hard disk drives. Read More

After attacks, Google vows to fortify Android Market
Google will build new safeguards into Android Market, its application store for the Android mobile OS, following an attack that infected thousands of phones and forced the company to wipe the malware remotely from phones, it said late Saturday. Read More


WHITE PAPER: PacketMotion

PacketSentry Virtual Segmentation
While firewalls are a widely accepted technology for the Internet perimeter, when deployed internally for PCI scope segmentation they have significant deficiencies. This white paper outlines the issues faced with leveraging firewalls for internal network segmentation, and how PacketSentry bypasses these issues with a unique out of band approach. Read now!

How We Tested Virtualization Security
We did not test performance. We concentrated on what it took to setup new policies, hosts, reports, and user roles in each product, and how the various parts of each product worked to protect a typical multi-host ESX installation. Read More

CIOs plot their response to tech's unstoppable forces
CIOs at Computerworld's Premier 100 conference share their responses to the IT trends, including mobile devices, ubiquity and cloud computing. Read More

Wells Fargo says no to personal smartphones and tablets, period
Wells Fargo imposes strict regulations on employee-owned mobile devices and social networking sites because of security risks. Read More


WHITE PAPER: Eaton

Maximizing UPS Availability
This white paper explains why, contrary to popular belief, modular UPS designs provide superior availability even though they typically contain more parts that could potentially fail. Read More

Google throws 'kill switch' on Android phones
For only the second time, Google has remotely deleted Android apps from users' phones, moving to erase malware-infected applications that users had downloaded from the Android Market. Read More

Microsoft can't wait for IE6 to die
Microsoft is counting down the IE6 browser's dying breaths with a new website Read More

SonicWall CEO: Application awareness crucial for IT security
SonicWall once focused on small and midsize businesses, but its introduction earlier this year of a next-generation firewall line dubbed SuperMassive leaves no doubt that the company is now taking aim at larger enterprises. In fact, the privately-held San Jose company's CEO, Matt Madeiros, says the enterprise market accounted for nearly half of SonicWall's sales over the past six months. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011.

Top 10 Chrome OS extensions
Though Google is pitching it as an operating system for netbooks and lightweight notebooks, Chrome OS is essentially the Chrome Web browser bolted on top of a bare minimum version of Linux. The following extensions can improve the user experience of Chrome (OS or browser) to give you some of the functionality found in a traditional operating system.

MOST-READ STORIES

  1. TSA surveillance: Peep show, police state, privacy invasion?
  2. IPv6 on home routers and DSL/cable modems: FAIL
  3. Is your company at risk of an IPv6 brain drain?
  4. Wells Fargo says no to personal smartphones and tablets
  5. Microsoft boosts kill-IE6 campaign with new countdown site
  6. Top student charged with fixing grades for cash
  7. Cisco, sources reveal data center next steps
  8. Wi-Fi chugs toward 1 gig
  9. How IT pros cheat on certification exams
  10. The 6 biggest misconceptions about IPv6

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


2 comments:

  1. When sensitive information is transmitted outside of trusted systems, it should be encrypted to preserve confidentiality. An example of this is the information gathered from the credit cards.

    ReplyDelete
  2. Anyone in possession of the private key can decrypt even the most strongly encrypted message. It is imperative that private keys be securely distributed and stored to ensure that security is not compromised.

    ReplyDelete