Search This Blog

Thursday, January 19, 2012

Expert to IT pros: Adopt IPv6 soon or be sorry later

  Will 2012 be the dawn of DNSSEC? | RSA, unapologetic, looks to move beyond The Breach
 
  Network World Network Optimization

Forward this to a Friend >>>


Expert to IT pros: Adopt IPv6 soon or be sorry later
A dozen of the world's largest Internet companies -- including Facebook, Google and Comcast -- have committed to June 6, 2012, as the start date for their production deployments of IPv6, an upgrade to the Internet's main communications protocol. Read More


RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
Infrastructure-as-a-Service (IaaS) is one of the fastest-growing cloud computing. However, cloud providers usage agreements squarely make the user responsible for protecting servers, applications and data. CloudPassage Halo is the award winning cloud server security platform that has everything you need to secure your cloud servers. Read More

WHITE PAPER: Akamai Technologies, Inc.

Understanding Web Application Security
This paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection. Learn more

Will 2012 be the dawn of DNSSEC?
Will 2012 be the year when U.S. retailers, banks and content providers finally bolster their DNS systems with an add-on security measure that prevents Web site spoofing? That's what advocates of the security measure - dubbed DNSSEC for DNS Security Extensions - are hoping will occur. Read More

RSA, unapologetic, looks to move beyond The Breach
Last April's RSA security breach was engineered by a nation-state whose ultimate goal was not to steal secrets about SecurID tokens but rather to use those secrets to compromise U.S. military contractors that protected their networks with the devices, RSA officials say. Read More

Full steam ahead for gigabit wireless, report says
The uptake of wireless networks based on 802.11ac is expected to be high when the first products arrive later this year, according to a report from IMS Research. Read More


WHITE PAPER: Aerohive

Aerohive Corporate Brochure
The way that Wi-Fi is being used and the requirements on an enterprise Wi-Fi network are going through a fundamental and generational change, so much so that we are calling it Wireless 2.0. It's not a new term, but it is a relevant one. Read now.

Data center networking discontinuity impacts network security
Data center consolidation and server virtualization are creating data centers of massive scale, and thus radically changing the data center environment. Unfortunately, legacy data center networking equipment was not designed for this type of scale and dynamic use case. ESG calls this state data center networking discontinuity. Read More

Alcatel-Lucent, Arbor Networks partner on DDOS mitigation
Alcatel-Lucent is now offering a router with technology from Arbor Networks that defends against distributed denial-of-service attacks. Read More

Twitter, Facebook fuel SOPA protests
Several major internet companies and thousands of concerned users are lighting up social networks in efforts to spread opposition to controversial anti-piracy bills now under debate in Congress. Read More


WHITE PAPER: Riverbed

Forrester: IT Platform to Optimize and Consolidate
In this report, Forrester investigates the reasons why you should consider WAN optimization solutions as the best way to gain better IT performance, cost savings, and greater flexibility for your business. And it's also a smart network improvement investment over the long-term. Get the facts about WAN optimization in this study. Read now!

Clamor for cloud apps increases corporate data breach risk
Vendor analysis of network and application traffic shows poorly managed remote access tools and traffic flowing outside port 80 are rampant. Read More

LightSquared claims GPS industry rigged tests
LightSquared's proposed mobile data network was set up to fail in tests of interference with GPS that were conducted last November under government auspices, the would-be cellular carrier charged on Wednesday. Read More

Survey: Security deployments, training reduce cyberattack wipeouts, downtime
A survey of 1,425 information technology managers in 32 countries about the type of security they deployed on their network endpoints, as well as security training for employees, indicates that these technology investments paid off in mitigating cyberattacks and downtime. Read More

 
 
 

SLIDESHOWS

12 available devices to test drive Windows 8
Here are a dozen off-the-shelf devices that Microsoft says it uses in its labs to put Windows 8 through its paces. You, too, can buy one if you haven't already.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Inside Google at work and play
  2. 12 available devices to test drive Windows 8
  3. The 36 best iPhone games
  4. What do your gadgets really weigh?
  5. The best of CES 2012
  6. Will 2012 be the dawn of DNSSEC?
  7. RSA, unapologetic, looks to move beyond The Breach
  8. Fundamental Oracle flaw revealed
  9. 5 reasons Macs are gaining ground in the enterprise
  10. New Facebook attack targets e-cash users
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: