Search This Blog

Wednesday, December 21, 2011

Juniper vs. Palo Alto: Next-gen firewall legal brawl

DHS looking to bolster drone security surveillance system | FBI Warns Hacktivists: You're Breaking the Law

Network World Security

Forward this to a Friend >>>


Juniper vs. Palo Alto: Next-gen firewall legal brawl
Juniper Networks says that Palo Alto Networks is infringing on its next-generation firewall technology, which was invented by Palo Alto's founders but for which Juniper holds the patents. Read More


WHITE PAPER: Symantec

When Good Backups Go bad data recovery Failures
Whether you're considering software, cloud or an appliance for backup, it's time to modernize your infrastructure and make sure your approach includes: • Better protection of VMs • More use of disk and cloud as backup targets • Use of data deduplication and archiving • Simplified configuration, setup and use of Web-based administration View Now

WHITE PAPER: Sybase

Scaling Out Query Performance with Sybase IQ 15.3
This paper is meant to provide a holistic perspective and introduce the technical concepts behind DQP in general and Sybase® IQ 15.3's DQP implementation through the PlexQ Distributed Query Platform. Read now.

DHS looking to bolster drone security surveillance system
The Department of Homeland Security is looking to bolster is drone squadron with a surveillance package able to watch over a wide swath of area day or night. Read More

FBI Warns Hacktivists: You're Breaking the Law
Last July, the FBI executed what is arguably its most public campaign against hacktivists--individuals who breach computer systems to make a political or ideological statement. On Tuesday, July 19, the G-men cuffed 12 men and two women allegedly associated with hacktivist group Anonymous for their supposed involvement in a dedicated denial of service (DDoS) attack against PayPal's website in December 2010. Read More

IBM predicts five big technologies of the future
IBM today issued its sixth annual look at what Big Blue thinks will be the five biggest technologies for the next five years. In past prediction packages the company has had some success in predicting the future of telemedicine and nanotechnology. Read More


WHITE PAPER: BMC

Managing Cloud Services from Request to Retirement
This lifecycle is tailored to the needs of the business, with both the flexibility to deliver the full required software stacks and the management rigor to ensure the operational integrity of the cloud. Learn More!

Antivirus software sales expected to show strong growth in 2012
The prevalence with which hackers are handing out headaches to IT security pros will have a big upside for vendors in the coming year, according to new figures from Canalys. Read More

Cloud activity to explode in 2012
In testing cloud computing services and observing the growth of cloud activities, we've noticed that there are distinct phases that organizations go through in adopting cloud. Read More

The Internet has escaped the ax, at least in the US, at least for now
A year ago I wrote that 2011 would be a year in which the Internet would "be under a multi-pronged attack that threatens to change it irrevocably in ways that may destroy much of the Internet's potential." Well, 2011 has come and mostly gone, and it turned out that my pessimism may have been misplaced but not invalid. Read More


WHITE PAPER: i365

How SMBs Can Enhance DR Planning with Cloud Storage
Aberdeen discovered that organizations that moved part of their data storage to the cloud recovered from downtime almost four times as fast as those businesses without a cloud strategy. Read Aberdeen's opinion on the role of the cloud for small and mid-sized businesses, what's holding some IT leaders back, and tips to get started. View Now

Lady Gaga Twitter, Facebook pages recover from iPad 2 scamhacks
Lady Gaga's Twitter and Facebook pages were hacked on Monday, tricking some of her millions of followers to a scam website looking to suck up victims' personal information. Read More

The weirdest, wackiest and coolest sci/tech stories of 2011
This year we find horses helping to build the Internet, Apple having all the money in the world and way more wackiness Read More

Geekiest sweaters of all time
Tux the penguin, the big Apple and other cleverly designed sweaters are keeping techies warm – and oh so very fashionable Read More



SLIDESHOWS

10 Things We Love and Hate about Ubuntu Oneiric Ocelot 11.10
Ubuntu 11.10 has some jagged edges and documentation isn't easy to locate, but Canonical is certainly dreaming big with this latest update, dubbed Oneiric (dreamy) Ocelot.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Cisco impresses with UCS
  2. AT&T kills $39 billion T-Mobile deal
  3. Juniper vs. Palo Alto: Next-gen firewall legal brawl
  4. Cloud activity to explode in 2012
  5. IBM goes out on a limb to predict next 5 big things
  6. iPhone 5 rumor roll-up for the week ending Dec. 16
  7. Cisco continues to restructure internally
  8. IT groups reveal their best enterprise tablet trick
  9. Why Eric Schmidt's prediction about Android vs. iOS development is wrong
  10. Is it over at RIM?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: