Search This Blog

Friday, September 30, 2011

Cisco sees new security role in the cloud

  Microsoft's botnet take-down helps protect Mac users | NAC saves University of North Carolina money, keeps illegal file sharing in check
 
  Network World Security

Forward this to a Friend >>>


Cisco sees new security role in the cloud
IT Security needs to be completely rethought in the age of cloud computing, according to Tom Gillis. Read More


WHITE PAPER: Dell and Intel

A Virtualization Roadmap
Virtualization is more than a technology. It is a way of thinking about problems that allow us to go beyond the physical limitations normally associated with entire classes of hardware, from servers to storage. Attaining the maximum benefits of virtualization, however, requires a plan and constant monitoring to ensure peak performance. Read now.

WHITE PAPER: HP & Intel

IDC: Ways to Improve the Branch Office
Well-targeted technology upgrades, coupled with a rigorous program to standardize and improve IT practices at a company's remote locations and headquarters, can deliver substantial business value and could reduce total annual IT costs in the branches by over 30%. Read now

Microsoft's botnet take-down helps protect Mac users
Mac users can thank Microsoft for taking down a small but dangerous botnet -- Kelihos. Read More

NAC saves University of North Carolina money, keeps illegal file sharing in check
Network access control (NAC) is saving the University of North Carolina at Chapel Hill $40,000 per year by keeping students from illegally using peer-to-peer file-sharing applications. Read More

Romance scams pick on divorced, lovelorn
Research out of the UK today says that perhaps as many as 200,00 people have been victims of online romance scams and the same study says over 1 million people personally know someone who has been scammed by one of these heartless fraudsters. Read More

Prototype "Rapid DNA" technology exhibited; could bolster forensic investigations
Using a portable kit to be able to quickly analyze human DNA collected in the field for investigative and forensics purposes has been a long-time dream for the Federal Bureau of Investigation (FBI), law enforcement and the Department of Defense (DoD). Read More


WHITE PAPER: Palo Alto Networks

Understanding and Selecting an Enterprise Firewall
This Securosis white paper analyzes the disruption happening at the enterprise perimeter, the various technical architectures capable of addressing the new requirements, and deployment considerations for optimal security, availability, and performance. Read now!

Cisco security advisory day
Cisco today unveiled a slew of security advisories on several vulnerabilities in its IOS software. In all, there look to be eight or nine advisories on IOS, dealing with issues like IPv6 over MPLS, IP service level agreements, SIP, NAT, IPv6 DoS and more. Read More

NASA: 19,500 mid-size asteroids around Earth, fewer than expected
First the good news: There are far fewer near Earth asteroids than NASA previously thought and it knows now where 90% of them are. The bad news, if you will is that there are still 19,500 mid-sized asteroids floating around out there. Read More

Data breach affects 4.9M active, retired military personnel
Sensitive data including Social Security Numbers, names, addresses, phone numbers and personal health data belonging to about 4.9 million active and retired U.S. military personnel may have been compromised. Read More

Finding security's opportunity to engage
As his clenched fist landed on the mahogany table in an angry blow, the papers in front of him sought shelter on the floor as each of the seven people gathered for the meeting took a collective roll back in their chairs. Read More


WHITE PAPER: Sybase

Sybase® IQ Accelerates Advanced Analytics
The market-leading column-based analytics server, Sybase® IQ offers accurate answers, scalability and speed for your advanced analytics environments. No platform is better suited to help your business analyse, compete and deliver above the competition. Read now

IT pros say social media at work is good but risky: survey
Network security pros think use of social media at work is good for business, but also creates risks they don't have the tools to address, according to a Ponemon Institute survey. Read More

My collision with Andy Rooney's ethical blind spot
You've likely heard that Sunday will mark Andy Rooney's final appearance on "60 Minutes." And perhaps you've also read some of the accolades pouring in about the man's remarkable career, which began as a war correspondent during World War II. Rooney is revered by many, especially those with whom he has worked over the years. Read More

Russian company adds BlackBerry password cracker
A Russian security company has upgraded a phone-password cracking suite with the ability to figure out the master device password for Research in Motion's BlackBerry devices. Read More

Catching Up With Mobile Security Threats
The tools for combatting mobile security threats to corporate data are evolving to address the concerns of wary CIOs. Read More

Google's 5 biggest hits (and misses)
Read More

 
 
 

SLIDESHOWS

Geekiest cupcake designs
From mainstream iPhone and Google icons to geeky Ubuntu and Big Blue logos, cupcake bakers have taken inspiration from technology for their complex fondant-and-frosting structures. Here are some of our photogenic favorites.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. First look: Amazon Kindle Fire
  2. Will iPad soon be affordable even for cheapskates?
  3. Tablet throwdown: Amazon Kindle Fire vs. Apple iPad 2
  4. Juniper takes on Cisco, HP in 'simple' networking
  5. Samsung to pay Microsoft royalties for Android
  6. Digg scrapes Facebook for diggers' real identities & photos, change profiles
  7. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
  8. Mac OS X Lion: Losing its security pride
  9. 8 piles of paper replaced by iPads
  10. Ig Nobel prizes: laugh first, think later
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: