Search This Blog

Thursday, July 07, 2011

Is your company ready for 4G mobile connectivity?

Microsoft: We're not vulnerable to DDoS attacks | Microsoft: No botnet is indestructible

Network World Security Strategies

Forward this to a Friend >>>


Is your company ready for 4G mobile connectivity?
We will increasingly see users challenging (in every sense) our ability to protect data – and comply with laws such as the Health Insurance Portability and Availability Act (HIPAA) as the move to mobile computing continues. Read More


RESOURCE COMPLIMENTS OF: Palo Alto Networks

Next-Generation Firewalls Decision Guide:
When comparing Palo Alto Networks with Check Point, it's important to understand the underlying architecture of the two solutions because they have far-reaching implications in terms of security effectiveness and performance. Simply stated, a security 1.0 architecture doesn't work in an enterprise 2.0 world. Click to continue

WHITE PAPER: Riverbed

The CIO's New Guide to Design of Global IT Infrastructure
Is it possible to eliminate the impact of distance? This paper explores the 5 key principles successful CIOs are using to redesign IT infrastructure of any size. Learn how to be prepared to adapt your environment in a way that supports distributed employees, anytime anywhere collaboration and the need for business continuity during a disaster. Read now!

Microsoft: We're not vulnerable to DDoS attacks
Uh-oh. There's nothing quite like throwing down the gauntlet and virtually taunting hackers to prove a proud boast is false. In what some attackers might consider a dare, John Howie, Microsoft's senior director in the Online Services Security & Compliance (OSSC) team, basically claimed that Microsoft sites are unhackable and can't be DDoSed. Read More

Microsoft: No botnet is indestructible
No botnet is invulnerable, a Microsoft lawyer involved with the Rustock take-down said, countering claims that another botnet was "practically indestructible." Read More


WHITE PAPER: Shoretel

The Changing Role of Mobile Communications in the Workplace
Mobile VoIP can help by leveraging Wi-Fi networks. Choosing an experienced technology vendor to deliver mVoIP capabilities can dramatically reduce costs while improving productivity. Read now!

DDoS attack in March likely N.Korean work, says McAfee
The cyber attacks that paralyzed a handful of major South Korean websites earlier this year were almost certainly carried out by North Korea or parties allied with the country, computer security company McAfee said Tuesday in a report. Read More

Billion-pixel camera set to snap Milky Way shots
The European Space Agency says it has completed what it calls the largest digital camera ever built for a space mission - a one billion pixel array camera that will help create a three-dimensional picture of the Milky Way Galaxy. Read More


WHITE PAPER: Riverbed

How to Improve Disaster Recovery for the Enterprise
Ready to accelerate disaster recovery across your entire enterprise? Read this Taneja report to find out how you can increase WAN efficiency, overcome latency, and optimize IT performance for disaster recovery by deploying WAN optimization. Read Now.

Google dealing with privacy bugs in Google+
Google's new social networking site Google+, built to beat Facebook primarily on privacy features, has several privacy bugs the company is working to fix. Read More

Hacking team claims NATO server compromised
A group of hackers going by the name of the "Inj3ct0r Team" are claiming they've compromised a server belonging to the North Atlantic Treaty Organization (NATO). Read More

Italian police raid Italian branch of Anonymous
Italian police have reported 15 suspected members of the Italian branch of the Anonymous hacker group to the judiciary for investigation on charges of illegally accessing IT systems, damaging IT systems and interrupting a public service, Italian media reported Wednesday. Read More

Google+ Privacy: 5 Settings You Need to Know
While Google's new social network, Google+, is barely a week old, it's already received a lot of attention from tech pundits and the social media community. And as with any new online service, understanding how to control your information is essential. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

Five potential Facebook killers
The social networking scene is constantly in flux. Facebook is at the top of the heap right now, but challengers are springing up all the time, hoping to leverage the next big wave into a lucrative IPO. Here are five social media sites that are creating a buzz.

MOST-READ STORIES

  1. Microsoft patent division taking cash from at least 5 Android vendors
  2. Microsoft, Citrix join VMware at top of Gartner's Magic Quadrant
  3. 5 hot social networking sites
  4. What's so cool about SIP?
  5. Minnesota furloughs 75% of IT staff amid shutdown
  6. 10 HP TouchPad apps for newbies
  7. Swiss party makes dislike of PowerPoint a political issue
  8. Microsoft claims Linux violates 235 patents
  9. Cisco Cius is not a tablet
  10. How to live with malware infections

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: