Search This Blog

Thursday, February 21, 2013

Dell: We can beat Cisco in enterprise and cloud security

  How to hack the certificate for a Cisco Identity Services Engine node | The beginning of the end of BYOD as we know it
 
  Network World Security

Forward this to a Friend >>>


Dell: We can beat Cisco in enterprise and cloud security
Dell can trump Cisco in the information-technology security market, say Dell's executives in describing how the company with its multifaceted approach will hold an edge against some powerful rivals that also include HP and IBM. Read More


WHITE PAPER: F5 Networks

Solving Substantiation with SAML
Read this paper to learn how F5 uses SAML to effectively enable secure web domains to exchange user authentication and authorization data, providing users of web browsers with single sign-on (SSO) convenience they need. Learn More!

WHITE PAPER: Fiberlink Communications

Achieving True Enterprise Mobility
Download MDM Is Only Half the Battle from CITO Research to learn the tenets of effective Mobile Device Management (MDM) and the need for the same conversations to take place around Mobile Application Management. Learn More

How to hack the certificate for a Cisco Identity Services Engine node
I just got back from a few weeks traveling around Europe, presenting at Cisco Live Europe, and meeting with customers and partners. It is obvious that this blog is very much needed for a lot of the deployments that we discussed, so as promised in the Load Balancing Blog, I am following up with a blog on how to "hack" the certificate for a Cisco Identity Services Engine (ISE) node, so that we may include... Read More

The beginning of the end of BYOD as we know it
Earlier this week, the market leader in application delivery controllers (ADCs), F5 Networks, added to its security portfolio by announcing its own BYOD solution, know as Mobile Application Manager. Mobile App Manager is designed to remove many of the challenges associated with BYOD by taking the burden off the device and pushing the functions into the network. Read More

Apple ships Java update, malware scrubber after confirming attacks on own Macs
The day it acknowledged company-owned Macs had been hacked using a "drive-by" Java exploit, Apple on Tuesday patched the Oracle software for older systems and released a malware detection tool. Read More


WHITE PAPER: McAfee

Next Generation Network IPS
This paper discusses the six critical management capabilities of next-generation IPS solutions to help reduce operational overhead while unifying across multiple environments, streamlining security operations and protecting against targeted threats. Read Now

Quick look: Did China's army hack US companies?
Security firm Mandiant says that for past seven years a group inside China's People's Liberation Army hacked 141 companies. Read More

Mandiant Security Report: The Chinese are coming, The Chinese are coming
Yesterday's report by Mandiant outlining the activities of a group behind literally hundreds of APT attacks and tracking them back to a specific unit of the Chinese People's Liberation Army (PLA) was chilling. For me they connected the dots so well that I don't doubt the conclusions of the report. Read More

Insect assassin drones? Armed drones choosing targets? What could possibly go wrong?
Last year, I wrote about the future of drone surveillance and swarms of cyborg insect drones. That article was full of MAV (micro aerial vehicles) that looked like they should be in a B-grade sci-fi flick. In particular, after seeing a freaky video, I'd like to remind you of the U.S. Read More


WHITE PAPER: Symantec

Is Online Backup Right For Your Business?
Read this whitepaper to find out how cloud-based hybrid backup offers significant cost savings, to small and medium-size businesses, as well as flexible options designed for agility, and a workforce that is free to focus on the company's core offering. Read Now!

The Curse of Compliance
I used to work with a guy who was significantly overweight. I ran into him in the cafeteria one day and he mentioned that his doctor recommended that he eschew large lunches in favor of lighter foods like salads. He proceeded to the salad bar where he buried a few greens, onions, and tomatoes under a mountain of cheese, deli meats, and blue cheese dressing. So my fellow employee was complying with... Read More

Notification of .edu server breach mistaken for phishing email
The administrators of 7,000 university websites are being required to change their .edu domain account passwords after a security breach ... one that was reported to them by Educause, the non-profit higher-education IT group that administers .edu, via an email that some complained bore the markings of a phishing attempt. First the breach. From a statement issued yesterday by Garth Jordan, vice president... Read More

Don't get Apple picked: How to protect your Mac from theft in public places
You hear the statistic all the time--so often, in fact, that it becomes noise: A laptop is stolen every 53 seconds. According to the FBI, 97 percent of them are never recovered. Read More

 
 
 

SLIDESHOWS

13 of the biggest security myths busted

13 myths about information-technology security you'll hear but should you believe?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco declares war on Microsoft unified communications system

2. iPhone 6 rumor rollup for the week ending Feb. 15

3. First look: HTC One

4. Microsoft shows off iPhone, iPad and Android clients

5. Microsoft Azure overtakes Amazon's cloud in performance test

6. 13 of the biggest security myths busted

7. Did China's army hack U.S. companies?

8. Watch a Chinese military hacker launch a successful attack

9. Oxford overreacts to phishing, temporarily blocks Google Docs

10. Apple victim of malware attack

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: