Friday, November 04, 2011

Godfather of Xen: Virtualization holds key to future of enterprise secruity

Anonymity vs. real names on social networks | CCIE vs. MBA vs...?

Network World Compliance

Forward this to a Friend >>>


Godfather of Xen: Virtualization holds key to future of enterprise secruity
While conventional wisdom says virtualized environments and public clouds create massive security headaches, the godfather of Xen, the open source hypervisor, says virtualization actually holds a key to better security. Read More


WHITE PAPER: Intel

Optimize virtualization with HP & Intel
Virtualization has become a powerful enabler for consolidating servers, running applications in multiple operating system environments, simplifying administration and lowering operating costs. This paper describes how to optimize server virtualization using enterprise-class HP Multi-Port Server Adapters and Intel® Ethernet technology. Click to continue

WHITE PAPER: Citrix

Best Practices for Implementing 2048-bit SSL
Ready for 2048-bit SSL? Not with F5. Shift to Citrix NetScaler. 2x faster 2048-bit SSL performance. Download the Citrix and Verisign 2048-bit Performance Kit. Learn more

Anonymity vs. real names on social networks
Let's cut to the chase: This one is really about whether Facebook and the new kid on the block, Google+, should get to throw their considerable weight around by requiring that users post to their social-networking sites using real names. Read More

CCIE vs. MBA vs...?
When CIOs look to add talent to their staffs right now, who should they be recruiting: employees with deep technical skills or deep business skills? That's one argument raging in corporate IT departments over the benefits of hiring staff with technical certifications such as Cisco Certified Internet Expert (CCIE) or business degrees. Read More

They are the 11 percent (or less) who really get security
Our survey shows only a small percentage of respondents making a top priority of data protection, strengthened governance and risk-based investments. Read More


WHITE PAPER: Dell

Mobile Technology: The Productivity Edge
IT must devise a workable balance by ensuring security of mobile data without squashing worker productivity. This Mobility KnowledgeVault will walk you through four key factors to build a workable plan and highlights real-world examples of businesses that are succeeding at fulfilling the productivity promise of mobility. View now

Microsoft expected to offer hot fix for Duqu soon
The big zero-day exploit on everyone's mind is Duqu, or "son of Stuxnet" - but researchers don't expect Microsoft to include a patch for it in next week's Patch Tuesday. Instead, a manual fix could be out as soon as this week. Read More

Ebooks vs. Print books
The question about ebooks is not if they will pass print, but when. Read More

A Law Firm's Hiring Strategies for Handling New Security Concerns
New data privacy concerns and increased regulation have led law firm Morrison & Foerster to add a new position. Here's what they did to facilitate that hire. Read More


WHITE PAPER: Trend Micro

Protect Virtual Desktops
Protecting virtual servers, virtual desktops and data stored in the cloud requires security optimized for the unique characteristics of these environments. See Tolly Enteprises' Independent performance tests comparing the performance of Trend Micro, McAfee, and Symantec. Read Now

Smartphones, social media tied into ELERTS emergency system
Chris Russo, deputy fire chief in the Massachusetts coastal town of Hull, launches ELERTS, an emergency communication system that uses smartphones and social media to communicate with first responders and other emergency personnel. Read More

Bloodiest tech industry layoffs of 2011
Job cuts in the U.S. technology industry in 2011 are down significantly from a year ago and turnover levels in IT shops have returned to pre-recessionary levels, but that doesn't make the tens of thousands of people in the United States who have been laid off from electronics, telecommunications and computer industry jobs feel much better. Read More

Holiday shopping with personal devices at work could pose security risk
Workers plan to do more online holiday shopping this year while on the job, with many using their own smartphones and tablets. That's got IT managers worried, a survey shows. Insider (registration required) Read More



SLIDESHOWS

Security Industry All-Stars
Welcome to the Security All-Stars! Here we have assembled our list of top players in information security who year after year demonstrate the specialized skills that make them worth listening to.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Fabric wars: Cisco vs. Brocade vs. Juniper
  2. Gartner: 10 key IT trends for 2012
  3. Stallman parody site catches Stallman's attention
  4. Network World's 33 hottest tech arguments
  5. Cisco vs. HP vs. IBM vs. Dell
  6. U.S. energy agency demos blazingly fast network
  7. Virtualization wars: VMware vs. Hyper-V vs. XenServer vs. KVM
  8. Wikipedia commissions study to measure accuracy of Wikipedia
  9. Browser wars: IE vs. Firefox vs. Chrome vs. Safari vs. Opera
  10. Coolest tech-o-lanterns

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment