Search This Blog

Monday, November 10, 2014

Microsoft plans monster security update; Cisco, Arista disaggregating?

Network World Network/Systems Management - Newsletter - networkworld.com
Cisco, Arista disaggregating? | Companies use urban office locations to attract IT talent

Network World Network/Systems Management

Microsoft plans monster security update for next week
Microsoft today said it will issue 16 security updates on Tuesday, the most in more than three years, to patch Internet Explorer (IE), Windows, Office, Exchange Server and SharePoint Server. The 16 "bulletins," as Microsoft calls its updates, listed in today's advance notice were nearly double the previous 2014 record of nine set in May and August, trumped 2013's record of 13, and came within an ace of the all-time 17 last set in April 2011. Read More


WEBCAST: Centrify Corporation

Enterprise SaaS Security and Governance Considerations
The security and governance impact of SaaS-based applications has been tremendous due to a lack of IT visibility and control. This Webcast explores how to mitigate the risks in applications like Salesforce, GoogleApps, Dropbox, and more. Learn more >>

WEBCAST: Ciena Corporation

Security+ Guide to Network Security Fundamentals
Serious IT breaches happen too often. Is there a way to reduce or eliminate the impact on consumers? Attend this Live Webinar Dec. 2nd,1:00 PM ET / 10:00 AM PT to learn methods for protecting your information resources. Learn More

Cisco, Arista disaggregating?
Should Cisco and Arista make like Cumulus Networks and develop versions of their operating systems for bare metal hardware? If the market shifts dramatically toward white box switching from brand name networking, they may have to. Read More

Companies use urban office locations to attract IT talent
To attract workers in the competitive technology job market, remote connectivity service provider LogMeIn decided that a change of address was needed. For about a decade, the company was based in an office park in Woburn, Massachusetts, a suburb 10 miles north of Boston. But as LogMeIn discovered that younger tech workers preferred to live and work in the city, in 2013 the company moved to a trendy waterfront Boston neighborhood and turned a former warehouse built in 1904 into its loft-like headquarters. Read More

Dell's gambit to go private is working. Should Microsoft follow?
Michael Dell took a massive chance last year to take his struggling company private and spent eight long months fighting Carl Icahn, who tried mightily to sabotage his plans. One year later, it seems Michael was right and Carl was wrong. Read More


WHITE PAPER: Surfwatch Labs

Cybersecurity and the C-Suite
This paper is written for business decision-makers to help understand the risk landscape and learn how to incorporate a sound cyber risk framework that is based on a business intelligence approach. Learn More

Net neutrality advocates: Hybrid approach won't work
In the fractious debate over net neutrality, efforts to strike a compromise don't seem to be working. A proposal reportedly favored by a top U.S. regulator is drawing fire from groups on both sides of the issue, with 70 pro-net neutrality groups speaking up against the plan Friday. Read More

Peeping into 73,000 unsecured security cameras thanks to default passwords
Yesterday I stumbled onto a site indexing 73,011 locations with unsecured security cameras in 256 countries …unsecured as in "secured" with default usernames and passwords. Read More

7 ways IT can do a better job of listening to its end-user customers
Consider the plight of the typical automaker. Many of their customers are frustrated with their car experiences, yet this frustration can't be easily tapped due to data firewalls that surround the car buying and ownership process. Read More


WHITE PAPER: Citrix Systems

10 essential elements for secure enterprise mobility
This white paper highlights 10 key points encompassing security, user experience, IT operations and BYOD to help your organization realize the full benefits of mobility. Learn more

INSIDER
Nasuni raises the bar for hybrid cloud storage
As growth in cloud-based storage products continues to accelerate, enterprise vendors have taken cloud storage to the next level. The hybrid model, which utilizes both local and offsite storage, offers organizations a way to more seamlessly scale up and manage large amounts of data with a single-vendor service. Read More

Hacking traffic lights given as example of possible G20 cyberattacks
G20 is an "irresistible target for hackers," according to Greg Rudd, spokesman for the Council of Registered Ethical Security Testers, or CREST Australia. Hackers "would love to just get into the traffic light system for example and just disrupt that and what they're after really is free international media," Rudd told ABC. Read More

Silk Road's demise paves way for 'unstoppable' OpenBazaar's rise
Federal investigators may have taken down the Silk Road again, but now they face a much more difficult challenge – a decentralized market that has no sole proprietor or owner to arrest. Read More


SLIDESHOWS

20 great productivity apps for Android, iOS, and the Web

These 20 essential apps work on all three platforms, helping you stay productive no matter what device you or your co-workers use.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Google: Move over cloud, the next IT disruption is upon us

2. Cisco patches serious vulnerabilities in small business RV Series routers

3. 15 addictive video game picks from the Internet Archive's new arcade

4. FBI grabs a Most Wanted Cyber Fugitive

5. Black Friday sales promise iPhone 6 deals

6. One lawyer may have just killed part of the Internet of Things

7. After criticizing it, Cisco joins Open Compute

8. Experts: Don't use Apple Pay, CurrentC until crooks get a shot at them

9. AT&T, others launch OpenDaylight SDN alternative

10. Credit Card Skimming: How thieves can steal your card info without you knowing it


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: