Search This Blog

Thursday, May 14, 2009

Is the U.S. ready for government-sponsored cyberattacks? This week's 25 most-read stories

Network World logo

Daily News PM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by NetApp
rule

Everything you need to know about Storage
Visit this site to learn of newest storage advancements, issues and product announcements - issues such as Fibre Channel over Ethernet and whether vendors' plans for the technology make sense. The site includes a weekly blog, briefs on storage technologies and products, and links to stories on IDG's sites about storage.

rule

Spotlight Story
Is the U.S. ready for government-sponsored cyberattacks?

Ellen Messmer By Ellen Messmer
The Navy Cyber Defense Operations Command is ready to defend against cyberattacks. Meanwhile other parts of the U.S. military -- and other countries -- are developing cyber weapons for offensive use. Is the spread of cyber weapons akin to the proliferation of nuclear weapons after World War II? Read full story

Related News:

News podcast: Network World 360
Microsoft Wednesday said it will support server virtualization for Office Communications Server 2007 R2, its first statement on what portions of its real-time platform will run in a virtual environment. Also, online-classifieds site Craigslist said on Wednesday it will remove the "erotic services" category of advertisements from its U.S. Web site in a week, after the site was criticized by law enforcement agencies as providing a forum for prostitution and other illegal activities. (5:27)

Debug the Interwebs?
A reader stumps Mark Gibbs with a simple question about network outages.

FTC targets massive car warranty robocall scheme
Robocalls are a scourge and the Federal Trade Commission today took action against one outfit by asking a federal court to shut down companies that have been bombarding consumers with hundreds of millions of allegedly deceptive robocalls in an effort to sell vehicle service contracts.

This week's 25 most-read stories

1. Where the IT jobs are: 10 American cities
2. Poster on Chinese forum leaks next-gen iPhone specs
3. Google ran out of bandwidth? ... Google?
4. 20 most useful career sites for IT professionals
5. Death of the mouse
6. Inside a data leak audit
7. Too much experience could be hurting your IT job search
8. "Space snuggie" could shield future astronauts from radiation
9. Products of the Week
10. Data center 10G whets switching companies' appetites

11. Bill would turn Internet flamers into felons
12. Evolution of Ethernet
13. Apple iPhoneys: The 4G edition
14. Microsoft: Corporate Vista testers should switch to Win 7 RC
15. 3Com takes another shot at enterprise switching, hoping third time is a charm
16. The Internet sky really is falling
17. Juniper ships 'cloud' switch
18. 10 tech-inspired Mother's Day gifts
19. 12 killer freebie SharePoint add-ons
20. PoE without the PoE switch

21. A buyer's guide to laptops -- from mighty mites to mobile monsters
22. 4chan users trigger DDoS attack ... on 4chan
23. Top 10 technology skills
24. Seven things to love, hate about Windows 7
25. Robot Fight Club


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by NetApp
rule

Everything you need to know about Storage
Visit this site to learn of newest storage advancements, issues and product announcements - issues such as Fibre Channel over Ethernet and whether vendors' plans for the technology make sense. The site includes a weekly blog, briefs on storage technologies and products, and links to stories on IDG's sites about storage.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


Compare Network Management Products
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Network Management Product Guide.
Visit now

 

05/14/09

Today's most-read stories:

  1. Google ran out of bandwidth?
  2. Where the IT jobs are: 10 American cities
  3. Poster on Chinese forum leaks next-gen iPhone specs
  4. Microsoft IT goes live with its Geneva identity platform
  5. Too much experience could be hurting your IT job search
  6. What Cisco devices will come of the Clearwire deal?
  7. Nortel is certainly taking its time
  8. Microsoft outlines OCS virtualization support
  9. Inside a data leak audit
  10. Full disk encryption comes to Workgroups


Network World on Twitter: Get our tweets and stay plugged in to networking news


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09.
Register now, attend free



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: