Search This Blog

Monday, July 18, 2011

US military learning cybersecurity lessons from businesses

Imagine: Massively scalable multi-core security | 10 technologies that will change the world in the next 10 years

Network World Security: Identity Management

Forward this to a Friend >>>


US military learning cybersecurity lessons from businesses
In its new cyberdefense strategy, the Pentagon is drawing on lessons about agility, lifecycle management and supply-chain protection that have already been learned by private corporations. Read More


WHITE PAPER: Raritan

Best Practices: KVM Smart Card Authentication Systems
Selecting a smart card-enabled KVM system? Choose one that supports PKI authentication to multiple servers from a single location and makes the necessary KVM feature adjustments to enable seamless use of the reader. This White Paper examines best practices when evaluating a Smart Card solution. Learn More

WHITE PAPER: Shoretel

The Changing Role of Mobile Communications in the Workplace
Mobile VoIP can help by leveraging Wi-Fi networks. Choosing an experienced technology vendor to deliver mVoIP capabilities can dramatically reduce costs while improving productivity. Read now!

Imagine: Massively scalable multi-core security
Desktops and servers are being transformed by virtualization and multi-core CPUs, but that effect is a bit harder to see in security. Multi-core CPUs especially hold the possibility of completely transforming how and where we do security. One of the effects is to shift more of the security functions into the network. Another may be to radically change the software architecture within and across security appliances. Read More

10 technologies that will change the world in the next 10 years
3D printers, sensor networks, virtual humans and other technologies under development now will drastically change our world in the decade to come, according to Cisco chief futurist Dave Evans. Read More

DARPA program wants to corral zany social media world into a science
Looking to reign-in the sort of wild-west atmosphere that can surround social media outlets, military researchers at the Defense Advanced Research Projects Agency are offering $42 million in grants to develop what it calls a new science of social networks. Read More


WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

Pentagon unveils five steps for better cybersecurity
The U.S. Department of Defense goes public with its strategy for cyberspace. Read More

Researcher finds dangerous vulnerability in Skype
A security consultant has notified Skype of a cross-site scripting flaw that could be used to change the password on someone's account, according to details posted online. Read More

Mobile security risks: comparing iOS to Android
Calling an iPhone a phone is like calling Mount Everest a hill. Smart devices based on the iOS or Android mobile operating systems are powerful computers. They can run quite a few apps and increase the user's productivity, whether it's for personal or company use, or both. Unfortunately, these devices have security vulnerabilities, just as desktop and notebook computers do. Security and systems management vendor Symantec has produced a good guide to help you compare the security postures of the iOS and Android operating systems and understand where the greatest vulnerabilities are. Read More


WHITE PAPER: ADTRAN

Unified Communications: Getting the Green Light
In these articles, Network World and its sister IDG Enterprise publications explore the rising importance of UC within the enterprise and provide advice on how to create a working strategy. Learn more

The identity list
I've often said to myself that I need to compile a list of links to all things Identity on the Web. Now I don't have to. Read More

US hails progress with Russia on cybersecurity cooperation
Russia and the U.S. are working to reduce chances for a cybersecurity incident that could damage the countries' relationship, according to the top cybersecurity adviser to U.S. President Barack Obama. Read More

Banking Trojan hits Android phones
A banking Trojan that has plagued Symbian, BlackBerry and Windows Phone users has now made its way to Android devices. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

10 HP TouchPad apps for newbies
HP took the wraps off its shiny new webOS-based tablet - the TouchPad - on July 1. And like the Apple iPad, the Motorola Xoom and the BlackBerry PlayBook, this tablet debuts with a pack of applications customized for the tablet form factor.

MOST-READ STORIES

  1. Mobile security risks: comparing iOS to Android
  2. 7 free Windows tune-up tools and tips
  3. It's Mango vs. Apple in a Battle of the Fruitphones
  4. iPad-controlled supercomputing as a service coming this fall
  5. Cisco's resolve unflagging despite massive layoffs coming
  6. Cisco injects new life into Catalyst 6500 switch
  7. No IT? No offices? No problem for this virtual firm
  8. Why Microsoft's Windows 8 strategy is puzzling the pundits
  9. HP fires back at Cisco's Sup 2T
  10. Extreme slashes 16% of workforce

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: