Friday, August 30, 2013

Unisys going on offense in server and security markets

Hot products from VMworld 2013 | Facebook report on government data requests a reminder there is no privacy

Network World Compliance

Forward this to a Friend >>>


INSIDER
Unisys going on offense in server and security markets
CEO Ed Coleman says a new software-focused data center strategy and powerful new security technology will enable Unisys to take up the attack in vital market segments and shake up customer views about the usually quiet company. Read More


WEBCAST: HP Intel VMware

The Cloud: Why the Hybrid Cloud May Be Best
A combination of the public and private cloud, the hybrid cloud fits the needs of a broad range of enterprises. View Now!

WHITE PAPER: Condusiv Technologies

IDC: I/O Optimization Boosts Virtualization Performance
In this Tech Spotlight, IDC highlights the plague of unnecessary I/O in virtual environments, the need for software intelligence to remove it, the importance of I/O optimization at the top of the stack and why Condusiv should be considered as an alternative to hardware for performance. Read now!

Hot products from VMworld 2013
Click through to see all the latest from the show in San Francisco. Read More

Facebook report on government data requests a reminder there is no privacy
Facebook, others cannot refuse legitimate requests, so users should think twice before posting and follow employers' policies for social networks Read More

Three types of DNS attacks and how to deal with them
The Syrian Electronic Army, a pro-Assad hacking group, altered the DNS records used by the New York Times, Twitter, and the Huffington Post. The changes forced one site offline and caused problems for the others. Here are three ways such attacks happen, and how they can be mitigated Read More


WHITE PAPER: Mitel Networks

Computerworld Report: Wrangling Your Mobile Devices
This report looks at how IT executives at companies large and small are learning to embrace the mobile device trend, by rethinking their strategies, hammering out new policies and locking down their critical data. Learn More

Anonymous responds to FBI claims of victory with record leaks
Anonymous leaks thousands of records days after FBI claims it dismantled the hacktivist group Read More

Next Microsoft CEO faces rocky road in easing NSA-fueled privacy worries
Ballmer's replacement will have to build trust overseas, especially after report Germany advised to not use Windows 8 because of backdoor Read More

VMware spotlights key NSX security tool for deploying security software and services
VMware's NSX network virtualization platform, expected out by year end, will have a key security tool for deploying security software and services to VMware-based virtual machines. Read More


WHITE PAPER: Verizon

Secure, Stable Cloud Computing
Business-critical applications in the cloud require the highest level of multilayered security. Learn how Terremark's secure, advanced data centers and clustered grid architecture provide the redundancy needed to keep critical systems up when hardware goes down while also providing monitoring, backups, patching and incident management. Learn More

Developers hack Dropbox, show how to access to user data
Developers who were able to bypass Dropbox's security by reverse-engineering Python applications -- the language used by the cloud storage provider -- described their technique in a published paper. Read More

Tesla Model S vulnerable to hackers, kind of
It's the curse of the connected car – once it's linked to the Internet, it's, well, on the Internet. In the case of the Tesla Model S, this means that malicious hackers could, in theory, control some functions of the vehicle and even track it without the owner's knowledge. Read More

Hackers may cash in when XP is retired
Hackers may bank their Windows XP zero-day exploits and cash them in after Microsoft stops patching the aged operating system next April. Read More

Sept. 23 deadline looms for business compliance with HITECH Act on patient privacy
Organizations handling protected health information have until Sept. 23 to comply with new security and privacy requirements that were included as part of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009. Read More

How technology is transforming the NFL
Read More


SLIDESHOWS

Hot products from VMworld 2013

Click through to see all the latest from the show in San Francisco.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Juniper kills MobileNext mobile packet product line

2. IBM starts restricting hardware patches to paying customers

3. Old electronics don't die, they pile up

4. School starts mass social media surveillance of students for their 'safety'

5. Developers hack Dropbox, show how to access user data

6. Spear phishing led to DNS attack against the New York Times, others

7. Cisco in for a virtual fight

8. Apple's iPhone trade-in program is a game changer

9. Hot products from VMworld 2013

10. Linus Torvalds celebrates 22 years of Linux with nostalgic message


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment