Wednesday, July 30, 2014

A breakdown of Cisco ACI pricing

Homeland Security wants corporate board of directors more involved in cyber-security | Cisco ready to ship ACI controller

Network World Cisco

Forward this to a Friend >>>


A breakdown of Cisco ACI pricing
Software licensing, hardware costs, and bundles for starters and Catalyst 6500 upgrades Read More


WEBCAST: Cisco Systems

Innovations that Protect Against Advanced Attackers
This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >>

WHITE PAPER: McAfee

The Significant Threat of Advanced Evasion Techniques
Advanced hacking methods, like advanced evasion techniques (AETs) have become more prevalent and harder to detect. Yet many network security vendors have downplayed the threat they pose as purely theoretical. Learn the false sense of security many IT professionals are under View Now

Homeland Security wants corporate board of directors more involved in cyber-security
Setting corporate cyber-security policy and taking actions around it must be a top concern for the board of directors at any company, not just the information-technology division, the Department of Homeland Security (DHS) indicated as a high-level official there backed a private-sector effort to raise awareness at the board level.Andrew Ozment, assistant secretary, Office of Cybersecurity and Communications at DHS, today said DHS endorsed the principles spelled out in the “NACD Directors’ Handbook on Cyber-Risk Oversight” published by the National Association of Corporate Directors, which has over 14,000 members who are directors for public, private and non-profit organizations. The DHS will include the NACD’s handbook on the U.S. CERT website as a source of information for businesses. In any organization, the board of directors is there to oversee its general direction, including how well upper management is performing.To read this article in full or to leave a comment, please click here Read More

Cisco ready to ship ACI controller
APIC slated to ship later this week; new switches, bundles here too. Read More


WHITE PAPER: Dell

Achieve Deeper Network Security and Application Control
Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet to safeguard an organization from today's ever-evolving threats, NGFWs must be able to deliver an even deeper level of network security. View Now

Black Hat 2014: How to crack just about everything
How to crack just about everything As the world’s best security experts prepare to descend on Black Hat USA 2014 next month, they must be rubbing their hands in anticipation of colleague’s upcoming revelations about the latest means to crack a range of devices and flaws they’ve found in trusted protocols. Here is a sampling of some of the hottest presentations and defensive measures speakers will release in order to block the attacks they describe.To read this article in full or to leave a comment, please click here Read More

Georgia Tech launches early warning system for cyberthreats
Georgia Institute of Technology's applied research arm has launched an early warning system to help organizations prepare for possible cyberattacks.The Georgia Tech Research Institute (GTRI) developed the open source system called BlackForest, which will complement the institute's malware and spear-phishing intelligence systems.[Georgia Tech warns of emerging threats in cloud, mobile]GTRI describes BlackForest as being on the "cutting edge" of anticipating when cybercriminals may be planning a distributed denial-of-service attack or the latest malware variations under development.To read this article in full or to leave a comment, please click here Read More


WEBCAST: Fujitsu America

Network Management Challenges & the Benefits of Outsourcing
Virtually every business needs to do more with less, and IT is no exception. At the same time, the network has to meet the growing demands of the business. New research conducted by IDG explores the network management challenges that IT and telecom leaders face and how they are dealing with them. Learn more about the research results. Learn more >>

Testbed will help clouds and networks shake hands
The CloudEthernet Forum will use live traffic to develop and refine standards for end-to-end services Read More

FTC urges mobile carriers to help send cramming charges packing
Looking to throttle the multi-million dollar industry known as mobile cramming, the Federal Trade Commission today issued a report outlining five key steps carriers and legitimate third party providers should do to stop the fraud. FTC The FTC report focused on “carrier billing,” the placement of charges for goods and services of third-party merchants on a mobile phone bill. “Mobile Cramming: An FTC Staff Report” includes recommendations aimed at mobile carriers, merchants who offer goods and services charged directly to mobile phone bills, and billing intermediaries known as aggregators who facilitate the placement of such charges on mobile phone bills.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Windows 9 in November? Don't believe it

2. 10 amazing (and bizarre) drone discoveries

3. About those alleged backdoors in Microsoft products...

4. 17 obscure Windows tools and tricks too powerful to overlook

5. BYOA: Bring Your Own Authentication

6. Top 25 free tools for every Windows desktop

7. Cisco ready to ship ACI controller

8. Say goodbye to desktop phones

9. New products of the week 07.28.2014

10. Malwarebytes questions poor showing in anti-malware protection-evaluation lab testing


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment