Search This Blog

Thursday, May 02, 2013

Centralizing network security in the data center fabric

  The 7 elements of a successful security awareness program | Encryption as an enabler: the top 10 benefits
 
  Network World Security

Forward this to a Friend >>>


Centralizing network security in the data center fabric
Welcome. You have taken the red pill, gone down the rabbit hole, and found my first post on secure data center. Data center security is the topic of choice for many of the conversations I have today with customers, partners, and colleagues. There is growing concern, and for good reason, to protect the crown jewels from today's advanced and growing threats. My goal in authoring this blog is to discuss... Read More


RESOURCE COMPLIMENTS OF: GFI Cloud™

Save time & protect your company's IT with GFI Cloud™
Ensure key business applications are up-to-date, secure and running at peak performance the easy way with Patch Management in GFI Cloud. Covering the full Microsoft® product set and key third party security and non-security applications – all from one console at a time that suits you. Save time by automating repetitive but essential tasks – free trial.

WHITE PAPER: Aerohive

Wireless LAN: Preferred Enabler of BYOD
Bring Your Own Device (BYOD) and its array of wireless devices is becoming the dominant way workers access corporate networks . And it's forced IT leaders need to reexamine how to best provide secure, reliable and cost-effective wireless network access. Read Now

The 7 elements of a successful security awareness program
A list of action items for CSOs looking to bolster their security awareness programs. Read More

Encryption as an enabler: the top 10 benefits
If deployed correctly, encryption does not need to be a headache. Instead, encryption can be an enabler to achieve the flexibility, compliance and data privacy that is required in today's business environments. Read More


WHITE PAPER: F5

Vital Security Strategies for Microsoft Exchange
The demand for access to email anytime, anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn about vital security requirements every Exchange environment should have in place to improve security and availability for Exchange. Read Now.

Aging networking protocols abused in DDoS attacks
Aging networking protocols still employed by nearly every Internet-connected device are being abused by hackers to conduct distributed denial-of-service (DDoS) attacks. Read More

IBM premiers world's smallest movie - starring 10,000 atoms
Not that it's going to give the next Daniel Day Lewis movie a run for Oscar gold, but IBM today said it had created the world's smallest movie made from thousands of precisely placed atoms on nearly 250 frames of stop motion action. Read More


WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

Carnegie Mellon develops wee QWERTY texting technology for impossibly tiny devices
If smartwatches and other ultra-small devices are to become the text generators of the future, their diminutive keyboards are going to have to be way more useful for, um, big fingered typists. Carnegie Mellon researchers may have the answer to that problem. Called ZoomBoard, the text entry technique is based on the iconic QWERTY keyboard layout. Read More

A10 airs Thunder line of ADCs, along with more DDoS protection
A10 Networks this morning announced a new line of application delivery controllers -- distinct from the existing AX series -- dubbed "Thunder," saying that the new units offer more capacity in a smaller footprint. Read More

Online monitoring scheme bad news for security, opponents say
Government efforts to allow law enforcement to intercept all online communications would dramatically weaken Internet companies' ability to secure their infrastructure, opponents say. Read More

LivingSocial breach scope widens on finding of 60% sharing logins
If having to reset 50 million passwords was not enough to worry about, Dashlane has found that about 60 percent of LivingSocial members reuse their passwords at other sites. Read More

 
 
 

SLIDESHOWS

CEO pay

Median pay for tech CEOs in 2012 was $10.7 million, according to Network World's analysis of CEO compensation in the tech industry.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Carnegie Mellon develops wee QWERTY texting technology for impossibly tiny devices

2. EFF: Trust Twitter -- but not Apple or Verizon -- to protect your privacy

3. DARPA wants huge Holy Grail of mobile ad hoc networks

10. Apache server ambushed by sophisticated backdoor attacks

9. Improv group comes to rescue of texting pedestrians with Seeing-eye People

6. Developer divide: 19 generations of computer programmers

5. Arista heading off Cisco/Insieme at 100G SDNs?

4. CEO pay: Cash, stock awards, perks add up to big pay packages

7. HP Networking finally rolls out a data center switch

8. Twitter's 'Who to follow' feature sometimes gets lost

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: