Thursday, December 12, 2013

Juniper: Quick look at security strategy behind its SDN controller security

  "Revenge porn" operator busted over extortion allegations | Box adds security, automation to IT admin console

 
  Network World Security

Forward this to a Friend >>>


Juniper: Quick look at security strategy behind its SDN controller security
  Juniper Networks in September made its software-defined network (SDN) controller known as Contrail generally available. Network World Senior Editor Ellen Messmer delves into the security strategy behind the Contrail controller in a discussion with Juniper's Senior Director of Product Management Jennifer Linn, and Chris Hoff, vice president of strategic planning in the security business unit at Juniper. Read More
 


WHITE PAPER: Dell

EMA Radar for Hybrid Cloud Integration Technologies
Which cloud integration platform is right for your company? EMA Radar evaluated 7 leading cloud integration platform vendors for the value they deliver. How did they rank? Which is the right fit for your business? Read EMA Radar's report and learn more. Learn More

WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
  Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

"Revenge porn" operator busted over extortion allegations
The California-based operator of a revenge porn website who posted more than 10,000 sexually explicit photos and then allegedly tried to extort victims for as much as $350 each to remove the content is sitting in a San Diego jail today with $50,000 bail and possible jail time hanging over his head. Read More
 

Box adds security, automation to IT admin console
Box is prepping a revamped IT administration console for its cloud storage and file sharing service that adds content management, security and workflow automation capabilities. Read More
 

It Could Be a Very Happy New Year for FireEye
Ah, December. Time to reflect on the past year and look ahead to 2014. In retrospect, 2013 was a banner year for the security industry as the world finally woke up to the very real perils of cybersecurity. Of all many events of this year however, FireEye's IPO may have trumped them all. As I write this blog on December 11, 2013, FireEye's market cap is just north of $4.5 billion. Wow! Read... Read More
 


WHITE PAPER: AT&T

Transforming Your Organization with Mobility
This whitepaper intends to help organizations understand the critical elements of a mobilization solution, the value and inter-dependencies, and important enablement assessment questions. Learn More

The week NSA surveillance finally jumped the shark
Forget about the complaints from top tech leaders, the NSA's biggest problem is its own ridiculousness. Read More
 

NSA taps tracking cookies used by Google, others, to monitor surveillance targets
The browser cookies that online companies use to track Internet customers for targeted advertising are also used by the National Security Agency to track surveillance targets and break into their systems. Read More
 

Security tactics might have helped in foreign ministry hacks
  Network segmentation that restricts intruders' access to data would have helped contain Chinese hackers who breached computers at the foreign ministries of five European countries, an expert says. Read More
 


WHITE PAPER: CDW

Software Asset Management: Practices for Success
This white paper discusses best practices that can dramatically increase your success rate of a SAM deployment. Make sure and follow these steps and verify that your SAM toolkit has the necessary functionality to keep your organization steps ahead of the competition -it's a long term investment. Read Now

Secret TPP intellectual property agreement misses deadline
Negotiators on a secret trade treaty, which includes controversial intellectual property proposals, could not meet their year-end deadline for an agreement this week at Singapore. Read More
 

Now, more than ever, Twitter knows exactly where you are
  Twitter is stepping up its ability to track the location of its users. Read More
 

300 victims report fake support calls to security org
The Internet Storm Center, an arm of the SANS Technology Institute, has started collecting reports of fake support calls in an attempt to figure out how prevalent the scam is among computer owners. Read More
 

Identity-theft vulnerability fixed in Microsoft Office 365, says security firm
Microsoft has plugged a vulnerability in Microsoft Office 365 that would have let attackers grab user identities and steal email and documents, according to Adallom, the security vendor that says it discovered the problem. Read More
 

 

SLIDESHOWS

8 tricks to optimize Windows 8.1

Here are eight things we recommend doing to make Windows 8.1 more efficient.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 Linux distros to watch in 2014

2. Ubuntu 13.10: The good, the bad and the ugly

3. The worst IT project disasters of 2013

4. UPDATE: Microsoft backtracks on when it will stop selling Windows 7

5. 25 (mostly) tech company logos with hidden meanings

6. Symantec walks away from managed firewall and endpoint services

7. First Look: Dell's new campus network gear

8. 8 tricks to optimize Windows 8.1

9. Stats don't lie: Windows 8 has failed

10. Fatal distraction: 7 IT mistakes that will get you fired


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment