Wednesday, November 18, 2009

Endpoint security frustrates IT

Are nations paying criminals for botnet attacks?; Tracking the world's great unsolved math mysteries
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Sophos
rule

FREE Encryption Tool from Sophos
Encrypt and share your confidential files easily without having a full blown encryption solution in place.

Click to continue

rule

Spotlight Story
Endpoint security frustrates IT

There's a groundswell of frustration about today's endpoint security, as well as worries about how newer technologies such as virtualization or cloud computing will impact it, according to a new study. Read full story

Related News:

Are nations paying criminals for botnet attacks?
Nations that want to disrupt their enemies' banking, media and government resources don't need their own technical skills; they can simply order botnet attack services from cybercriminals.

Tracking the world's great unsolved math mysteries
Some math problems are as old as the wind, experts say and many remain truly unsolved.  But a new open source-based site from the American Institute of Mathematics (AIM) looks to help track work done and solve long-standing and difficult math problems.   

The Cloud Security Survival Guide
For companies increasingly dependent on cloud services, security challenges abound. Here's a collection of articles, columns and audio to help IT security practitioners plot the right course.

F5 bolsters Big-IP security features
New features in Big-IP version 10.1 are aimed at helping companies address Web application threats and ensure compliance with security regulations such as PCI.

New security products underperform, says ICSA
Many security products simply do not work as advertised, or at least need a lot of tinkering to make them work, a report from the respected ICSA Lab has found.

Hackers outwit Windows 7 activation
Hackers have figured out how to sidestep Windows 7's activation process, continuing a long-running battle with Microsoft, which has blocked such tactics in the past.

National Cybersecurity Awareness Month: Wait until next year!
I'm back in Washington DC for a series of meetings, so I'm reminded that the last time I was in town, I attended the National Cybersecurity Awareness Month kickoff event at the Ronald Reagan building. The event was sponsored by the National Cybersecurity Alliance and featured prominent speakers including Department of Homeland Security Secretary Janet Napolitano, Deputy Defense Secretary William...

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Vulnerability Management Checklist
Discover the 12 key decision points you need to consider when choosing a vulnerability management solution. This checklist walks you step-by-step through critical questions to ensure you select the solution that will best protect your network and data.
Learn more now.


Protecting Your Intellectual Property
Learn about the growing threat of insider data theft, the extent to which most companies are vulnerable, and how McAfee security products enable businesses to protect their most valuable asset-their data.
Click here.

 

November 18, 2009

MOST-READ STORIES

  1. Cray blows by IBM to regain supercomputing crown
  2. Microsoft's new lab pushes social networking boundaries
  3. 2009's top 10 emerging enterprise technologies
  4. Cool Yule Tools
  5. Shifting mobile cost to employees? Think twice
  6. Hackers outwit Windows 7 activation
  7. Latest WebOS update for the Palm Pre lacks iTunes support
  8. HP's 3Com acquisition: An inside look
  9. Supercomputers with 100 million cores coming by 2018
  10. Cisco ups offer for videoconferencing firm Tandberg to $3.4B

Achieve Data Warehousing Performance with a Column-Oriented Database
The growing demand for deep-dive data mining, complex event processing and strategic business analytics puts increased demands on today's data bases and data warehouse. Learn how an alternative data base approach, which begins by storing data by columns instead of rows, has proven to meet today's exploding data warehouses.
Read this Paper Now!



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment