Friday, January 17, 2014

Cisco: Thousands of web hosting centers now launchpads for attacks

Cisco fixes remote access vulnerabilities in Cisco Secure Access Control System | Cisco offers advice on Target breach

Network World Cisco

Forward this to a Friend >>>


Cisco: Thousands of web hosting centers now launchpads for attacks
Web hosting centers around the world are being compromised by cyber-criminals that use them to launch major attacks against business and government, says Cisco in its annual security report. This threat really gained full steam last year, the company says. Read More


WHITE PAPER: Silver Peak Systems, Inc.

An ROI Analysis of Virtualized WAN Optimization Software
The Enterprise Strategy Group discusses how data center consolidation, virtualization, and cloud architectures are on the rise; however IT budgets are not increasing. This poses a unique challenge: How do you crease a flexible and agile environment without increasing the cost? Learn more >>

WHITE PAPER: HP and Intel® Xeon® processors

HP Converged Storage Customers Share their Experiences
This Enterprise Strategy Group Solution Impact Analysis examines how well-designed, executed and implemented storage can elevate storage from a necessity and a cost center to an asset that contributes to the business. This report confirms that ROI is a real-world value that HP Converged Storage customers are realizing today. Learn More

Cisco fixes remote access vulnerabilities in Cisco Secure Access Control System
Cisco Systems has released software updates for its Cisco Secure Access Control System (ACS) in order to patch three vulnerabilities that could give remote attackers administrative access to the platform and allow them to execute OS-level commands without authorization. Read More

Cisco offers advice on Target breach
In the wake of the Target and Neiman Marcus data breaches, Cisco suggests encryption at the point-of-sale terminal. Read More


WHITE PAPER: Silver Peak Systems, Inc.

Wan Deduplication: Getting More by Sending Less
Recently, data deduplication has made its way from the storage to the networking community. More specifically, it has become an important tool for optimizing application performance across the WAN. This paper discusses how WAN deduplication works, and how it can be effectively deployed as a complement to existing storage deduplication solutions. Learn more >>

SDN startup looks to program the enterprise
SDN startup Anuta Networks has unveiled its second product, a network services virtualization systems for midsize and large enterprises. Read More

Feds issue Top 10 most wanted transportation safety advances
Travel, be it by car, airplane or rail has a certain component of danger to it, that's just the behavior of the humans who operate that equipment, the equipment itself and in many cases, Mother Nature. Read More


WHITE PAPER: Silver Peak Systems, Inc.

The Differences Between Network Memory & Application Caching
Enterprises require an application acceleration solution that spans all types of traffic, one that is easy to manage, and 100% data coherency when supporting business-critical applications. This white paper will address these issues and offer a solution that addresses these enterprise requirements. Learn more >>

How to Bring Shadow IT Under Control
Most business units these days are leveraging cloud services, and a majority of them are bypassing IT to do it, according to a new study. While many IT departments want to take charge of provisioning cloud services, it may make more sense to get your arms around compliance and governance first. Read More

An OpenStack Primer for IT Executives
OpenStack, the open source cloud computing platform, has garnered the support of more than 200 IT vendors. Enterprises embrace the platform for its flexible, hardware-agnostic architecture -- but they should realize that this modularity can come at a cost. Read More

Juniper announces Firefly Suite for virtual-machine security
Juniper today announced its Firefly Suite for virtual-machine security, a set of software-based products for VMware and KVM that contain the security and switching capabilities found in Juniper's SRX Series Services Gateway, as well as Junos Space Virtual Director. Read More

An Overview of Malware Protection Techniques
It should come as no surprise that nowadays malware has become big business. Bad actors are increasingly better funded and improving their approaches for attacking us. We have reached the point where hacking has become industrialized. As vendors develop solutions, attackers continue to innovate. Read More


SLIDESHOWS

The worst data breach incidents of 2013

These businesses and government agencies lost the most personal and financial records due to hackers or security mishaps last year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. How to make 96,000 pounds of WWII machinery into high-tech research platform

2. Microsoft Hyper-V bangs away at VMware's popularity

3. Cisco offers advice on Target breach

4. Relive the 1990s with these ancient, still-functioning websites

5. The mixed fate of Sun tech under Oracle

6. SDN will never happen, says VMware exec

7. Juniper should reevaluate switching, security products investor says

8. 18 great uses for an old Android device

9. Chrome 32: First look

10. Massive denial-of-service attacks pick up steam, new nefarious techniques


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment