Search This Blog

Wednesday, August 31, 2011

VMworld: Security, regulatory concerns still a challenge in virtualization

  Top cybersecurity concerns: Malicious code, employees run amok | Android Devices Exposed: 7 Ways to Thwart Hackers
 
  Network World Security

Forward this to a Friend >>>


VMworld: Security, regulatory concerns still a challenge in virtualization
While VMware users harbor little doubt about the cost savings and productivity gains brought by virtualizing their networks, security concerns still exist on many fronts, whether it's figuring out how to meet regulatory compliance with auditors, or evaluating cloud services. Read More


WHITE PAPER: GFI Software

PCI-DSS Compliance and GFI Software Products
The intent of this document is to provide you with GFI's understanding of the requirements, and how the GFI Software product line can assist you to meet PCI compliance as outlined in the PCI DSS Requirements. Read now!

WHITE PAPER: CenturyLink Business

Why IT Leaders Aren't Scared of Cloud Security
Examine this CIO report in which your peers offer advice on cloud services and data protection. Learn 3 key tips for taking the right approach to securing a hybrid cloud infrastructure to dispel any data doubts. Read now!

Top cybersecurity concerns: Malicious code, employees run amok
When 3,300 information-technology professionals were asked about cybersecurity, they said malicious code attacks accounted for the main type of cyberattack their organizations suffered during the past year, although "internal unintentional actions" by well-meaning insiders also wreaked havoc. Read More

Android Devices Exposed: 7 Ways to Thwart Hackers
Take a deep breath. There's a new report out highlighting a huge spike in threats against Google's Android platform. Yes, it's something to be concerned about. But don't freak out or return your cool new Samsung Galaxy Tab. Read More


WHITE PAPER: Riverbed

Case Study: Boston College
Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now

Trend Micro: Virtualization changing our anti-malware business big time
Virtualization -- in particular Trend Micro's close alliance with VMware -- is bringing about a strategic shift in Trend's anti-malware business as its products become designed for use with VMware's vShield technology. Read More

Hackers stole Google SSL certificate, Dutch firm admits
The Dutch company that issued a rogue digital certificate for all Google Internet domains said Tuesday that its network had been hacked last month. Read More


WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

Google, OpenDNS deploy DNS tweak for faster browsing
Nearly 40 million Internet users will experience faster Web browsing starting today, thanks to a protocol tweak being deployed by Google, OpenDNS and several content delivery networks that allows them to more precisely serve up content from the nearest available server. Read More

Akamai employee tried to sell secrets to Israel
A 43-year-old former Akamai employee has pleaded guilty to espionage charges after offering to hand over confidential information about the Web acceleration company to an agent posing as an Israeli consular official in Boston. Read More

Five Things CIOs Need to Know about Anonymous
1. Nobody's in charge. "We are Anonymous. We are legion." This cryptic slogan is used by a band of hackers who call themselves Anonymous. Active for nearly a decade now, the group catapulted into prominence in the past year with attacks on PayPal, Visa, HBGary and Sony. Often called a hacking collective, Anonymous is essentially a movement. There is no central authority. From time to time, participants band together to launch "operations," led by a small group of trusted associates. The operation leaders write up orders and invite anyone who is interested to participate. Operations can happen online or in the real world. Read More

Death by Morto A? It's your own fault, says Microsoft
The Morto A worm is having continued success despite its reliance on a list of lame passwords to take over victim machines. Read More

 
 
 

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

MOST-READ STORIES

  1. The ribbon is winding further into Windows
  2. Death by Morto A? It's your own fault, says Microsoft
  3. New Windows worm spreads by attacking weak passwords
  4. Windows Servers & Workstations vulnerable to worm in the wild
  5. Microsoft bashes VMware at VMworld, again
  6. IPv6: What you need to do now
  7. Distracted to death (Jennifer Aniston naked)
  8. Cisco buys Microsoft Office collaboration company
  9. Acme Packet: 'We're building a signal system for the Internet'
  10. Scariest IPv6 attack scenarios
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: