Search This Blog

Tuesday, March 11, 2014

Virtual machine (VM) security still a work in progress

IPv6 could open networks up to zero-day attacks | Simply put: How does certificate-based authentication work?

Network World Security

Forward this to a Friend >>>


Virtual machine (VM) security still a work in progress
Trying to protect your expanding virtual machine (VM) empire will require a security product that can enforce policies, prevent VMs from being terminated or infected, and deliver the virtual equivalents of firewalls, IPS and anti-virus solutions. Read More


WEBCAST: BlackBerry (Research In Motion | RIM)

How to Choose the Best DLP Solution for Your Organization
Find out how to choose a Data Leak Prevention containerization strategy that meets your organization's needs. Learn More

WHITE PAPER: IBM

Pay-as-you-Grow Data Protection
IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions they need, and add new functionalities as they grow. Read Now

INSIDER
IPv6 could open networks up to zero-day attacks
The National Institute of Standards and Technology (NIST) warns that moving from IPv4 to IPv6 is a process fraught with peril, which may explain why government agencies are so far behind their own deadlines for implementation. Read More

Simply put: How does certificate-based authentication work?
I find a few universal truths when mentioning certificates to people. Most people I speak with consider them to be a very secure concept almost without fail. However upon mentioning that I want to talk about certificates: that person's face turns a slightly lighter shade, their eyes get a bit wider, and they have this immediate fight or flight instinct kick in. I can tell you, this is a subject that... Read More


WHITE PAPER: IBM

Streamline Data Protection with Storage Manager
IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup and Restore, TSM is a far more comprehensive data-protection solution. Read Now

Joomla receives patches for zero-day SQL injection vulnerability, other flaws
Recently released security updates for the popular Joomla content management system (CMS) address a SQL injection vulnerability that poses a high risk and can be exploited to extract information from the databases of Joomla-based sites. Read More

Perspective: Microsoft risks security reputation ruin by retiring XP
A decade ago, Microsoft kicked off SDL, or Security Development Lifecycle, a now-widely-adopted process designed to bake security into software, and began building what has become an unmatched reputation in how a vendor writes more secure code, keeps customers informed about security issues, and backs that up with regular patches. Read More


WHITE PAPER: BlackBerry (Research In Motion | RIM)

The Critical Role of Support in Your EMM Strategy
Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist. Learn More

Snowden advocates at SXSW for improved data security
Encryption technologies can be a powerful tool against government surveillance, but the most effective techniques are still largely out of reach to the average Internet user, Edward Snowden said Monday. Read More

A clear-eyed guide to Mac OS X's actual security risks
Apple has improved its security in recent years, but is it enough? Read More

Researchers attack secured Internet activity to mine personal data
University researchers have developed a technique that governments and Internet service providers could use to bypass secured Internet connections and gather valuable personal information. Read More

Embarrassing stories shed light on U.S. officials' technological ignorance
It's no secret that many U.S. lawmakers are a bit behind the times in terms of technology. One expert speaking at the South by Southwest conference in Austin, Texas, shed some light recently on just how far behind some of the most powerful people still are. RELATED: 11% of Americans think HTML is an STD, software is 'comfortable clothing' Read More


SLIDESHOWS

How to protect virtual machines (VMs)

These four products represent different approaches to VM security.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPhone 6 rumor rollup for the week ending March 7

2. How to Add New Job Skills Without Going Back to School

3. The greatest security story never told -- how Microsoft's SDL saved Windows

4. Why does Eric Schmidt have so much trouble dealing with Google's role in The New Digital Age?

5. A clear-eyed guide to Mac OS X's actual security risks

6. If you haven't retired Windows XP and haven't been fired yet, get busy

7. Apple reveals unprecedented details in iOS security

8. Inside Cisco's private cloud

9. Google and Verizon take big steps in the cloud

10. IPv6 could open networks up to zero-day attacks


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: