Wednesday, January 11, 2012

Virtual-security appliances winning users over traditional messaging-security software

Who are the go-to cybersecurity help groups? | Attack code published for serious ASP.NET DoS vulnerability

Network World Security

Forward this to a Friend >>>


Virtual-security appliances winning users over traditional messaging-security software
There's no question enterprises want messaging security -- the market for products and services worldwide reached almost $3.2 billion last year, up from $2.7 billion in 2010, and will grow to $4.78 billion in 2015, according to research firm IDC. But a fundamental shift is occurring that foresees businesses favoring virtual-security appliances over more traditional messaging security software. Read More


WEBCAST: ForeScout Technologies

Experts Help CIOs Rethink Threat Prevention
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

WHITE PAPER: Aerohive

Eliminate Architectural Limitations of WLANs
Reduce the cost and complexity of wireless networks with cloud-enabled, distributed Wi-Fi and routing. By removing the architectural limitations of traditional WLANs, you can support identity-based access and enable delivery of mission-critical applications and services to any user, on any device, at any time without a single point of failure. Read now!

Who are the go-to cybersecurity help groups?
There are a ton of groups out there that offer cybersecurity help and guidance, the trick, it seems is finding the right one for your organization. Read More

Attack code published for serious ASP.NET DoS vulnerability
Exploit code for a recently patched denial-of-service (DoS) vulnerability that affects Microsoft's ASP.NET Web development platform has been published online, therefore increasing the risk of potential attacks. Read More


WHITE PAPER: Riverbed

Case Study - Psomas
As a high-growth firm, Psomas needed to accelerate application performance to accommodate a changing set of demands from the business as well as employees. With Riverbed Steelhead products deployed worldwide, their employees can now share work and leverage resources wherever they happen to be. Read now!

Visa certifies smartphones for NFC payments
Visa has added smartphones from Samsung Electronics, Research In Motion and LG Electronics to the list of devices it has certified to work with the 185,000 NFC-based payWave payment terminals in Europe. Read More

X Prize offers $10M competiton to build Star Trek-like medical tricorder
The X Prize Foundation is out to dramatically change the medical industry by offering a $10 million prize for the company that can build a mobile platform that can accurately diagnoses 15 diseases from 30 consumers in three days. Read More


WHITE PAPER: Bradford Networks

(BYOD) Unleashed in the Age of IT Consumerization
IT departments need to understand what devices are trying to connect to their networks, so they can provide convenient, secure access to those that are authorized, including personal iPads and smartphones. This white paper explains how IT departments can implement a practical and secure strategy and offer the convenience mobile devices provide. Read more

Cloud and disaster recovery: Load-balanced data centers are not a perfect solution
A growing trend in the disaster recovery arena for cloud providers is the use of load-balanced data centers instead of hot-cold data centers. Companies are deploying private clouds that are load balanced between their datacenters to take care of disaster needs. If one datacenter suffered from a disaster, the other datacenter would be operating even though it is at reduced capacity. Read More

What does 2012 have in store for Anonymous?
Anonymous had a busy year in 2011 pushing its hacker-activist agenda on companies around the Web, to the point where just the sound of the hacker group's name can send shivers down the spine of many a CIO. Anonymous in 2011 took on everything from HB Gary to a Mexican cartel, from oil companies to banks, from NBC to a transportation site. The group has positioned itself as a kind of Internet-based Robin Hood; when it hacked banks, the group claimed it was helping "the 99%" by giving money from the banks back to the people who rightfully deserved it. What have companies learned from this year of terror? The most that can be said is that corporate security needs to be shored up. At a conference panel in August it was evident that instead of battening down the security hatches, some companies were looking to just lessen the economic impact of a hack on their site. Network World has assembled some of the key stories surrounding Anonymous, the reactions from enterprise IT and their advice for surviving an attack, in a special PDF report that is free with Insider registration. So take a peek and then register to receive this package of stories about hackers' doings last year and what can be done next. Download "Hacktivists vs. the World" today. [[link]] Read More

Media Player, security bypass are focus of Microsoft's first Patch Tuesday of 2012
Seven bulletins, one deemed critical, and a handful of new Microsoft security issues all arrived today as part of Microsoft's first Patch Tuesday of 2012. Read More

10 questions for Palo Alto Networks CFO Michael Lehman
Name: Michael Lehman Read More



SLIDESHOWS

CES 2012 ultrabooks and tablets
Ultrabooks! Ultrabooks! That's the official biggest buzzword for this year's Consumer Electronics Show in Las Vegas. Ultrabooks! In honor of these purportedly magical super-thin laptops, we've decided to make a compilation of some of the ultrabooks you'll see at CES next week. And for good measure, we've thrown in a tablet that will garner a lot of attention as well. Enjoy!

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Will Microsoft's WiFi-NC set new network standard?
  2. IPhone 5 rumor rollup for the week ending Dec. 31
  3. CES: Gigabit Wi-Fi takes center stage
  4. Samsung plans smart TVs with face recognition, voice and gesture control
  5. 5 reasons Linux Mint is better than Ubuntu
  6. Cautious optimism: Details of Microsoft's first Patch Tuesday of 2012
  7. IPad 3 to sport HD camera on front, upgraded camera on back
  8. 9 hot technology startups to watch in 2012
  9. 30 years ago, a battered AT&T cried Uncle Sam
  10. Cisco cranks up Internet TV volume at CES

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment