Tuesday, July 14, 2009

Reality trumps theory

Invisible IPv6 traffic poses serious network threat; Rackspace outages teach cloud lessons
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by CDW
rule

The right technology at the right price.
You already know CDW is a great resource for technology, but you probably don't know we also offer extensive custom configuration services. So the next time you need the perfect IT solution, from simple to complex, turn to CDW.

rule

Spotlight Story
Reality trumps theory

One of the mottos of the Master of Science in Information Assurance (MSIA) Program at Norwich University is "Reality Trumps Theory." This mantra means that book-learning is great, but actually looking at how the world works is better. Read full story

Related News:

Invisible IPv6 traffic poses serious network threat
IPv6 — the next-generation Internet protocol — isn't keeping too many U.S. CIOs and network managers up worrying at night. But perhaps it should.

Rackspace outages teach cloud lessons
Back-to-back power outages at cloud service provider Rackspace offer some lessons that cloud providers and their customers can benefit from.

Five of the biggest IPv6-based threats facing CIOs
The IETF has identified many security threats related to IPv6, the long-anticipated upgrade to the Internet's main communications protocol.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Rise and fall of Nortel
vSphereFor better or worse, Nortel as we know it is coming to an end. Here's how the telecom giant got to this point.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

Stopping Fraud Before it Impacts your Network
Better protect your corporate assets with a solution that integrates with existing security devices and adds comprehensive analysis including: Correlation, anomaly detection and pattern discover. Discover the benefits of using holistic reporting, visual analytics and incident response tools.
Stopping Fraud Before it Impacts your Network


 

July 14, 2009

TOP STORIES | MOST DUGG STORIES

  1. How to use electrical outlets and cheap lasers to steal data
  2. Rackspace aims to repair credibility in wake of power failures
  3. Invisible IPv6 traffic poses serious network threat
  4. The 10 dumbest mistakes network managers make
  5. Twitter suspends accounts of users with infected computers
  6. The botnet world is booming
  7. 11 security companies to watch
  8. How many Twitter followers does it take to get a job?
  9. Ex-Googler says Chrome OS will be a vastly different OS
  10. What's driving this university to IPv6? Going green

Business Intelligence Reporting
Think beyond the current structure of a report and personalize it with Business Intelligence Reporting Tools (BIRT) Interactive Viewer. Meet data visualization requirements faster and with less development by making BIRT web output interactive. Register for this Live webcast on July 15th and recieve the Forrester report, "Inquiry Spotlight: Rich Internet Applications".
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment