Search This Blog

Friday, June 03, 2011

Battle looms over securing virtualized systems

Groupon IPO filing generates more jeers than cheers | Hotmail and Yahoo users also victims of targeted attacks

Network World Daily News AM

Forward this to a Friend >>>


Battle looms over securing virtualized systems
There's growing consensus that traditional approaches to network security -- the firewall and intrusion-prevention appliances, the host-based antivirus software -- simply do not work well in virtualized environments for which they were never designed. Read More


WHITE PAPER: BMC

Six Advantages of a Cloud-Based Help Desk
Small and midsize companies shouldn't have to use less efficient, limited-functionality service desk solutions. Today's cloud-based help desks pack the same punch as on-premise enterprise solutions, without a large up-front investment or long installation time. Read more to find out how to get started with a cloud-based help desk today. Read More Today!

RESOURCE COMPLIMENTS OF: Aerohive Networks

Aerohive Networks: Cloud-based Wi-Fi Done Right
Aerohive simplifies networks with cloud-enabled, distributed Wi-Fi and routing solutions for medium sized enterprises including branch offices and teleworkers. Aerohive's cooperative control Wi-Fi architecture, public or private cloud-enabled network management, routing and VPN solutions eliminate costly controllers and single points of failure. Click to continue

Groupon IPO filing generates more jeers than cheers
While Groupon's IPO filing yesterday was certainly not unexpected, the largely negative reaction to it may surprise some, even if it fails to dampen enthusiasm for the offering. Nicholas Carlson at Business Insider provides a concise rundown of the key facts and figures. The one that seems to be attracting the most public attention is that Groupon lost $413 million last year. Read More

Hotmail and Yahoo users also victims of targeted attacks
Web mail users at Yahoo and Hotmail have been hit with the same kind of targeted attacks that were disclosed earlier this week by Google, according to security software vendor Trend Micro. Read More

Cisco resorting to intimidation tactics
Customers accuse Cisco of intimidation when they did not buy anything, or enough from, the world's leading and largest networking company. According to this Bloomberg story, Cisco questioned the competency of IT and networking officials at companies that rejected Cisco in favor of equipment from its competitors. Read More


WHITE PAPER: HP & Intel

Avert a Storage Space and Power Crisis
Cornell Medical College was exceeding space and power capacities in its NYC data center. After evaluating storage arrays from multiple vendors, they chose 3PAR to "right-size" their storage and deploy a robust, highly virtualized infrastructure that integrated seamlessly with VMware, reduced their storage footprint and minimized power consumption. Read Now.

Computex 2011: The Top 14 Stories So Far at Taiwan's Giant Tech Show
Processor wars, new tablets galore and Chrome OS' move to Asia were some of the hot topics at this week's Computex 2011 Tech show. Take a look. Read More

Daily innovation smackdown: Ray Ozzie vs. Jerry Yang
Did voters let Ray Ozzie move to the second round because of his innovative prowess or is there enough disdain for Steve Ballmer out there that they would vote for anyone but him? Ozzie gained 90% of the vote vs Ballmer in round 1 and now sets his sights on Yahoo's Jerry Yang, who had a tougher time with Symantec's John Thompson in the previous round. If Microsoft had bought Yahoo this could have been a second match where Ozzie tries to take down a Microsoft exec (of which he used to be one also). Read More

IRS: Top 10 things every taxpayer should know about identity theft
As part of a look at the impact of identity theft and the Internal Revenue Service, watchdogs at the Government Accountability Office issued the IRS' top 10 list of identity theft information everyone should be aware of. Some of the information is obvious, perhaps, but overall even the basics of security were followed in many cases the impact of identity theft could be reduced. Read More


WHITE PAPER: Dell

Mobility KnowledgeVault
The resources in this Mobility KnowledgeVault provide expert guidance, peer advice, survey results and best practices to help you protect your mobile infrastructure. From determining a policy for employee-owned devices and data encryption to supporting the six major mobile operating systems, securing mobile devices and data is a top priority. View now

Sony Pictures falls victim to major data breach
LulzSec, a hacking group that recently made news for hacking into PBS, claimed today that it has broken into several Sony Pictures websites and accessed unencrypted personal information on over 1 million people. Read More

Apple, Google, Facebook turn N.C. into data center hub
Apple is the latest high-profile tech company to open a data center in western North Carolina to take advantage of relatively low land and power costs. Read More

Google adds '+1' rating feature to Android Market
Google is giving Android Market users a new way to evaluate Android Market applications even as it struggles to keep malicious apps off the store. Read More

Move over flash: Here comes phase-change memory
University of California, San Diego researchers next week plan to demonstrate a solid state storage device that uses phase-change memory to blow away traditional hard drives and even newer flash drives. Read More

FAQ: What's the future of OpenOffice.org?
Oracle suddenly announced Wednesday it was submitting the codebase for OpenOffice.org to the Apache Software Foundation, ending speculation about the open-source productivity suite's fate following Oracle's recent announcement it would be transitioned to a "solely community-based project." Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

4G Faceoff: ThunderBolt vs. Galaxy
We tested the Verizon Wireless HTC ThunderBolt and T-Mobile's Samsung Galaxy S 4G. Here are three things we liked/disliked about each product.

MOST-READ STORIES

  1. 'Secret law' of Patriot Act
  2. Developers find a lot to love in Windows Phone 7 Mango
  3. Bluetooth touts itself as the cancer-free wireless tech
  4. Oracle proposes OpenOffice.org to Apache Incubator
  5. Computer science grads fielding 'multiple job offers'
  6. Microsoft unveils touch-oriented Windows 8
  7. SpamCop disrupts millions of e-mail accounts
  8. 10G top-of-rack switches to surge to $1 billion in sales this year
  9. IT increasingly bypassed on cloud adoption
  10. Cisco: IP traffic to quadruple by 2015

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: