Search This Blog

Friday, April 04, 2014

VMware: How the hypervisor can be security's savior

7 all-in-one security suites: Anti-malware for all your devices | Users face serious threat as hackers take aim at routers, embedded devices

Network World Security

Forward this to a Friend >>>


VMware: How the hypervisor can be security's savior
Hypervisors that virtualize the compute, networking and storage tiers provide a unique platform for enforcing security policies, VMware executives argued this week at Interop. Read More


WHITE PAPER: Fortinet

Key Security Considerations for the Data Center
Your Data Center firewall security will soon need to support throughput over 100Gbps. John Grady, in an IDC Analyst Connection answers key questions regarding protecting the heart of the Enterprise. Learn more >>

WHITE PAPER: Sophos, Inc.

Advanced Persistent Threats: Detection and Protection
In this paper we'll explain how a multi-faceted approach to protect against APTs including layers of defense can reduce the risk of attacks. Learn More

7 all-in-one security suites: Anti-malware for all your devices
Let's face it: No matter what device you use, you're in danger. Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device -- like most of us do -- that makes it even more difficult and expensive to be vigilant and keep yourself safe. Read More

Users face serious threat as hackers take aim at routers, embedded devices
Home routers and other consumer embedded devices are plagued by basic vulnerabilities and can't be easily secured by non-technical users, which means they'll likely continue to be targeted in what has already become an increasing trend of mass attacks. Read More

Microsoft sketches out final Windows XP security updates for next week
Microsoft today said it will ship four security updates to customers next week that will include the final public fixes for flaws in Windows XP and Office 2003, both slated for retirement from security support on Tuesday. Read More


WHITE PAPER: Riverbed Technology

ESG - Evolving APM Big Data Approach
This latest release facilitates bi-directional workflows between operations and application development to expedite problem resolution. Register to read report. Read more>>

The New Cybersecurity Technology Reality, the Whole Is Greater than the Sum of its Parts
I wrote a blog last week about new integrated anti-malware technology last week in response to Palo Alto Network's acquisition of Cyvera. In fact, this integrated technology model isn't limited to anti-malware but is becoming the new reality across the cybersecurity life cycle of risk management, incident prevention, incident detection, and incident response. Read More

How Boeing is using the cloud
There's a lot of talk about the cloud, but how are businesses really using it? Read More

New Windows Phone security necessary, but not groundbreaking
Microsoft, which is far behind Apple and Google in the smartphone market, has introduced a number of security features in Windows Phone that are not groundbreaking, but necessary to attract businesses. Read More


WHITE PAPER: Fortinet

High Performance Data Center Firewall Survey
With Data Centers consolidating and virtualizing, the core infrastructure is upgrading to 10G, 40G and even 100G. The Firewall must keep pace with these changes otherwise it becomes a bottleneck. Does your Firewall have the horsepower to keep up? View now >>

Want to lower your risk? Lower the ROI of hackers
Hacking is no longer just a game for tech-savvy teens looking for bragging rights. It is a for-profit business -- a very big business. Yes, it is employed for corporate and political espionage, activism ("hacktivism") or even acts of cyberwar, but the majority of those in it, are in it for the money." Read More

Mars look bigger and brighter than usual? It should
Mars is closer to Earth than it has been for nearly seven years and with a 4-inch or larger telescope you may be able to get quite a view. According to Sky & Telescope in the middle two weeks of April, Mars will shine with a brightness of magnitude -1.5, matching the luster of Sirius - typically the brightest star in the night sky. Read More

What is on a US Secret Service mainframe anyway?
Periodically the Department of Homeland Security (DHS), which oversees the US Secret Service issues what it calls Privacy Impact Statements on systems that collect personally identifiable information. Today it issued a revealing statement on the package of applications that run on the Secret Service's mainframe and collect information about ongoing and resolved investigative cases. Read More

Security pros talk about playing defense against cybercrime
Security professionals are playing defense against cybercrime, and often feel outgunned by tech-savvy hackers and insiders out to steal sensitive data from within the business. They see a shortage of qualified security personnel to call on, but also believe that threat-detection tools are getting better. Read More


SLIDESHOWS

Hot products at Interop

These products are on display at the annual tech conference in Vegas.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco reveals OpenFlow SDN killer

2. FireEye, AhnLab score low in lab test of breach detection systems

3. The ultimate Windows XP quiz

4. The (mostly) cool history of the IBM mainframe

5. Juniper to lay off more than 500 and close facilities

6. The 10 computer science programs with the biggest payoff

7. How to respond to a data breach

8. Microsoft gives businesses reason to adopt Windows 8.1

9. China's unsupported XP machines hold the potential to become a massive botnet army

10. IE easily beats Chrome, Firefox, Safari in malware detection


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: