Search This Blog

Thursday, June 18, 2015

Top 10 botnet targets in the U.S. and worldwide

Speedier 5.4-Gigabit Wi-Fi routers coming this year | Microsoft needs SDN for Azure cloud

Network World Network Optimization

Top 10 botnet targets in the U.S. and worldwide
Every day the security team at Level 3 Communications monitors approximately 1.3 billion security events; mitigates roughly 22 distributed denial of service (DDoS) attacks; and removes, on average, one control and command (C2) server network. In its new botnet research report, 'Safeguarding the Internet,' Level 3 uses its own threat intelligence, combined with other data feeds, to define trends in botnet behavior, DDoS attacks and malware. Read More


RESOURCE COMPLIMENTS OF: IT Roadmap New York

IT Roadmap NYC Conference Focuses on 5 Pillars of Technology
The content-rich agenda has been redesigned and reenergized to include increased IDG content from editors you know and trust on topics such as: Security & Management, Network - From the Edge to the Core of the New Data Center, Analytics & Data Management, Cloud & Next Generation Apps, The Mobile/BYOD Enterprise, and more! Click to continue

WHITE PAPER: LogMeIn

Collaboration 2.0 Death of the Web Conference
This new study from Ovum and join.me by LogMeIn is based on a survey of over 3,900 full time professionals worldwide regarding their collaboration and meeting-related behaviors and activities. Learn More

Speedier 5.4-Gigabit Wi-Fi routers coming this year
It seems like I was only just writing about the new, up-to-3.2 Gbps Wi-Fi routers, such as the drone look-alike D-Link DIR-890L. Well, that generation of wireless networking gear using beamforming and combining multiple bands, is about to be superseded. Microprocessor-maker Broadcom has launched new 5.4 Gbps-capable chips that will appear in routers later this year. Read More

Microsoft needs SDN for Azure cloud
Microsoft's Azure couldn't scale without SDN. The Microsoft cloud, through which the company's software products are delivered, has 22 hyper-scale regions around the world. Azure storage and compute usage is doubling every six months, and Azure lines up 90,000 new subscribers a month. Read More

Cisco to make $10 billion investment in China
Cisco plans to invest US$10 billion in China, although its sales in the country are slumping due in part to persistent security concerns surrounding U.S. technology. Read More


WHITE PAPER: Dell Inc.

What to Consider Before Deploying New Laptops
Older PCs are a risk due to outdated OSs and the lack of robust hardware-based security. This Cheat Sheet paper discusses the points you should consider when selecting notebooks and laptops for your mobile and remote workforce. View Now

Xirrus takes aim at headaches of 'guest' Wi-Fi networks
It's enough to keep you on your phone's data connection – the annoying guest wireless network. Maybe it's got a clunky, slow-loading web portal to navigate. Maybe the password is hard to find. Or maybe it's entirely open, but you noticed that a seedy-looking guy over there has Wireshark open on his laptop. Read More

Free SSL/TLS certificate project moves closer to launch
Let's Encrypt, a project aimed at increasing the use of encryption across websites by issuing free digital certificates, is planning to issue the first ones next month. Read More

AT&T looking at white boxes as CPE
AT&T is considering offering bare metal switches and servers to consumers as customer premises equipment for the carrier's services. Read More


WHITE PAPER: Lookout Mobile Security

Managing App Sideloading Threats on iOS
This whitepaper examines the technical underpinnings that enable app-sideloading and also highlights Lookout's unique approach to managing this emerging security threat on iOS devices. Learn more.

Wi-Fi and LTE join up for gigabit mobile service in Korea
What happens if you combine the best of Wi-Fi and cellular networks? In South Korea, consumers get gigabit-speed service to their phones. Read More

Group asks FCC to make websites honor do-not-track requests
The agency has an obligation to protect privacy and promote broadband deployment, Consumer Watchdog says. Read More

No GA yet for Cisco's enterprise SDN
Cisco's enterprise SDN controller is still in controlled release a year after it was first supposed to be generally available and months after an updated GA date. Read More

INSIDER
How to use enterprise Wi-Fi security in SMBs
It's become de rigeur to protect wireless networks with Wi-Fi Protected Access II (WPA2) security, but many small and even midsize businesses default to using the personal or pre-shared key (PSK) mode of WPA2, rather than its enterprise mode. Despite its name, however, the enterprise mode isn't only for large networks; it has a place in all businesses. (Insider Story) Read More


SLIDESHOWS

5 low-cost Wi-Fi stumblers and analyzers

Wi-Fi stumblers and analyzers are a must-have when troubleshooting Wi-Fi interference and performance issues, or when checking channel usage.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Google-infused storage startup Cohesity reveals itself

2. Day One with Windows 10: Things get ugly

3. Tired of sitting all day? Tech pros take a stand

4. AT&T looking at white boxes as CPE

5. 19 free cloud storage options

6. iPhone 7 rumor rollup: Apple gets funny, iOS 9 drops hints

7. First Look: How will Windows 10 play on tablets

8. Why you should read What is Code?

9. Rackspace creates career path for tech execs who don't want to manage people

10. Vote for the Xbox 360 games you want to play on your Xbox One

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: