Search This Blog

Tuesday, October 18, 2011

Death to Firewalls; Long Live Firewalls

Gartner: 10 key IT trends for 2012 | NSF awards researchers $3M grant to advance "secure computation"

Network World Security

Forward this to a Friend >>>


Death to Firewalls; Long Live Firewalls
Firewalls have been slowly changing over the years as their network architectures have been evolving. Firewalls are becoming more decentralized and becoming increasingly virtualized. As firewalls move from solely located at the perimeter inward toward the servers, many other changes are taking place. The pendulum of centralized versus distributed systems continues to swing back and forth as the... Read More


RESOURCE COMPLIMENTS OF: Cisco Systems

Context-Aware Security for BYOD Trend
Concerned about the "Bring Your Own Device" (BYOD) trend? Although an "Any Device" environment is becoming essential for today's workplace, new risks and problems may result if your infrastructure isn't ready. Join IDC's Chris Christiansen and Cisco Systems as they discuss security architecture and solutions to address challenges for BYOD. Register Now

WEBCAST: Cisco

Demystifying Common Security Issues with the SecureX Files
Watch new videos which simplify cybersecurity for people outside the security industry. Each video focuses on a different topic, and explains how to make decisions that improve personal and organizational safety when using computing devices. Learn More

Gartner: 10 key IT trends for 2012
ORLANDO -- If you had to pick 10 technology-related trends that will impact your enterprise infrastructure in the coming year, Gartner says you'd do well to start with virtualization and move to other issues such as social media influence, energy issues and flat networks to name a few. Read More

NSF awards researchers $3M grant to advance "secure computation"
A research team led by the University of Virginia has been awarded a $3M NSF grant to build apps designed to let people work on computations together without sharing sensitive data. Read More


WHITE PAPER: IBM

Leveraging security from the Cloud
Cloud computing is a flexible, cost-effective and proven deliv-ery platform for providing business or consumer IT services over the Internet. This whitepaper discusses the who, what, when, why and how of cloud-based security services. Read Now

Gartner: The future of IT? Get ready to blow stuff up
If IT is to successfully move into the future it's going to need to blow up its current way of thinking and the way it supports mature technologies. That was the key message at the opening session of the Gartner Symposium IT/Expo here. "Mature technologies are code for obsolete," said Peter Sondergaard, senior vice president at Gartner and global head of research. "You must dare to employ creative destruction to eliminate legacy, and selectively destroy low impact systems." Read More

3 Ways to Save Yourself After a Phishing Attack
Microsoft and Mozilla are exchanging heated jabs about whose browser is more secure, but your browser can only protect you so much from phishing attacks. Your own brain may be your best defense. Here are three common problems caused by phishing, and how to solve them. Read More


WHITE PAPER: Quest Software

New NetVault Backup Licensing Model
Read a report from an industry-leading analyst to see why traditional backup and recovery licensing methods no longer make sense. You'll learn how you can dramatically cut costs with a different strategy that's more intuitive, reasonable, enduring, and flexible. Download the report today. Read Now!

Scareware spread from popular torrent site via malvertizing
Some of the users who visited KickassTorrents (KAT), one of the most popular torrent trackers on the Internet, over the weekend had the nasty surprise of being infected with a rogue antivirus program called "Security Sphere 2012." Read More

Extradition review could hurt UK hacker's case
A U.K. hacker fighting extradition to the U.S. may have lost one avenue for argument after an independent review panel concluded the U.K.-U.S. extradition treaty is not slanted against U.K. defendants. Read More

New social engineering poll reveals which scam works better
Which tactic works best for a scamming social engineer? Acting like an authority figure and requiring a victim to answer questions and give up sensitive information? Or acting like a nice, trustworthy person who strikes up a friendly conversation and just needs the victim to tell them a few things to help them out? Read More



SLIDESHOWS

26 helpful open source network management tools
Over the last decade or so, open source development has skyrocketed, and network management software has ridden that wave. Many frustrated IT administrators have turned to free tools to monitor, configure and map their networked devices. Here are 26 examples of open source network management software tools to help you do your job.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Gasp! Cisco and HP collaborate on blade switch
  2. iPhone 5 rumor roll-up for the week ending Oct. 14
  3. Cheap power: An overnight revolution
  4. Should tech pros get an MBA?
  5. 2011 tech industry graveyard
  6. BlackBerry maker hangs head, extends bouquet of flowers
  7. 10 tech-centric MBA programs
  8. Security roundup for Oct. 14
  9. 7 'MBA preferred' IT jobs
  10. Apple sees record breaking iPhone 4S sales

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: