Monday, May 13, 2013

Google's five-year plan for authentication: It's complicated

Academic institutions urged to take steps to prevent DNS amplification attacks | 10 more of the world's coolest data centers

Network World Security

Forward this to a Friend >>>


Google's five-year plan for authentication: It's complicated
Google has released a draft of its next five-year plan for login authentication that tries to stay at least on par with criminal hackers, but recognizes that strong security requires industry collaboration. Read More


WHITE PAPER: F5

Vital Security Strategies for Microsoft Exchange
The demand for access to email anytime, anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn about vital security requirements every Exchange environment should have in place to improve security and availability for Exchange. Read Now.

WHITE PAPER: Raritan Inc

The Distributed Enterprise: Remote Access and IT Management
For IT managers, remote offices can cause any number of headaches. Fortunately, Raritan offers solutions to help manage remote office control, security and budgetary issues. This white paper examines and analyzes the increases in uptime and security provided by out-of-band access and control tools. Learn more.

Academic institutions urged to take steps to prevent DNS amplification attacks
Colleges and universities are being encouraged to scrutinize their systems to keep them from being hijacked in DDoS (distributed denial-of-service) attacks. Read More

10 more of the world's coolest data centers
From a repurposed chapel to inflatable modules, data centers don't fit the same mold Read More


WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

Bill would put mobile app vendors on the hook for privacy
The mobile industry's efforts to convince lawmakers that self-regulation alone is the best way to address growing concerns over privacy-invading mobile applications appears to be running into some headwind. Read More

Name.com forces customers to reset passwords following security breach
Domain registrar Name.com forced its customers to reset their account passwords on Wednesday following a security breach on the company's servers that might have resulted in customer information being compromised. Read More


WHITE PAPER: Riverbed Technology

Case Study: Boston College
Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now

Microsoft Patch Tuesday targets multitude of Internet Explorer faults
Microsoft is issuing critical security bulletins this Patch Tuesday that affect all versions of Internet Explorer and deal with an exploit that attackers are actively working. Read More

10 Careers Robots Are Taking From You
Should we fear the rise of robots? From pharmacists to fast food cooks, here's a look at 10 advancements in technology that could put you out of work. Read More

Skylab: NASA's first space station marks 40 years
NASA's first space station was a pacesetter for current International Space Station and a trendsetter for scientific experiments in space Read More



SLIDESHOWS

Hottest products from Interop 2013

Interop 2013, one of the biggest networking shows each year, is here and the product announcements are plentiful.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 more of the world's coolest data centers

2. Nothing funny about how The Onion got hacked

3. Ubuntu desktop is just easy

10. Ubuntu Touch for smartphones could be ready by end of May

9. NSA's secret manual on Google searching and more comes to light

6. Last place you want to see a Windows error message: Las Vegas hotel elevator, 20th floor

5. iPad 5 rumor rollup for the week ending May 8

4. Hottest products from Interop 2013

7. 10 great technologies to secretly install on Mom's PC

8. Microsoft Patch Tuesday targets multitude of Internet Explorer faults


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment