Friday, June 28, 2013

How will cloud, virtualization and SDN complicate future firewall security?

FTC tells Google, Yahoo, Bing, others to better differentiate ads in web content searches | Facebook 'dossier' find raises contact list privacy questions

Network World Compliance

Forward this to a Friend >>>


How will cloud, virtualization and SDN complicate future firewall security?
The firewall in decades past was mainly the port-based guardian of the Internet. Now vendors are vying to build so-called "next-generation firewalls" that are "application-aware" because they can monitor and control access based on application use. Read More


WHITE PAPER: Cisco Systems

Getting the Most Out of Your Next-Generation Firewall
Trends such as BYOD and the adoption of social media and other grey applications as legitimate business tools have had profound effects on organizations of all sizes. Read Now

WEBCAST: IBM

Boost Profitability with Better Planning & Mobile Reporting
This session will discuss how Ashurst, a top-tier legal service provider for private and public sector clients worldwide, was able to effectively manage organizational change and improve their profitability using IBM Business Analytics. Learn More.

FTC tells Google, Yahoo, Bing, others to better differentiate ads in web content searches
The FTC this week sent letters to AOL, Ask.com, Bing, Blekko, DuckDuckGo, Google, and Yahoo!, as well as 17 of the most heavily trafficked search engines asking them to do a better job of making clear what is an ad and what isn't when serving up search results. Read More

Facebook 'dossier' find raises contact list privacy questions
Given the lack of privacy, people need to separate their personal contact lists from their business address book, one analyst noted Read More

Android ransomware marks profitable new era for cybercriminals
Such ransomware has been used against PCs for years, but is unique on mobile devices, Symantec says Read More


WHITE PAPER: FICO (Fair Isaac)

Cloud Analytics for the Masses
Learn the best practices in building applications that can leverage volume, variety and velocity of Big Data for organizations of any size. Learn more.

Quick look: 10 cool analog computers
In their heyday analog computers handled heavy-duty math, scientific and industrial applications Read More

How you are being watched?
World-wide look at the technology of public surveillance Read More

Geeks and leaks: Top 10 tech whistleblowers of all-time
Traitors or patriots? Heroes or villains? These 10 engineers, academics, and scientists became famous for blowing the whistle on dubious practices Read More


WEBCAST: Fluke Networks

Redefining Performance Management Video
See Jim Frey, Managing Research Director, Enterprise Management Assoc., Doug Roberts, Managing Director of Product Strategy, and Bruce Kosbab, CTO, Fluke Networks discussing how TruView redefines enterprise performance monitoring and troubleshooting. Learn More

Top EU court says printers can be taxed to compensate rights holders
Europe's top court ruled Thursday that it is legal for countries to impose a levy on printer manufacturers such as Canon, Epson, Fujitsu, Hewlett-Packard, Kyocera and Xerox in order to compensate rights holders for unauthorised reproduction of their work. Read More

11 highlights from Microsoft's BUILD conference
Microsoft kicked off it's BUILD developers conference Wednesday with a two hour keynote. Here are some of the takeaways. Read More

Report: NSA collected US email records, Internet use for years
The U.S. National Security Agency collected the email and Internet use records of some U.S. residents for about a decade following the 9/11 terrorist attacks, according to documents published Thursday by the U.K. newspaper the Guardian. Read More

Despite new malware scanning, Chrome Web Store security still falls short
Improving Chrome OS's security is key to driving its use in business, but one expert said Google still needs to vet developers' reputation Read More


SLIDESHOWS

Ultimate ultrabook shootout

Testing of eight Windows 8 ultrabooks reveals that users looking for a sleek form factor will have to accept tradeoffs.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Chambers: Cisco waited too long to address SDNs

2. Virtual imaging technology helps people move "out of body"

3. 10 Windows Start menus for Windows 8.1

4. Breaking down Cisco's new data center strategy

5. Cisco unveils a new security architecture at CiscoLive

6. Scientist out to break Amdahl's law

7. Quick look: 10 cool analog computers

8. iPad 5 rumor rollup for the week ending June 24

9. Hacking and attacking automated homes

10. Cisco, Insieme tout 'penalty-free' fabric architecture


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment