Wednesday, January 27, 2010

A security event without leaving your home

Cisco, NetApp, VMware team up on virtualization security | Nebraskan pleads guilty to 2008 Web attack on Scientologists

Network World Security: Identity Management Alert

Forward this to a Friend >>>


A security event without leaving your home
Last fall I was twice put in the quandary of choosing between two conferences going on simultaneously. In September there was Digital ID World in Las Vegas and The Experts Conference in Berlin. While November saw both the Cloud Computing Expo and the Internet Identity Workshop sharing the same week. I thought I could shuttle between Cloud Computing and IIW, since they were being held only 5 miles apart, but in reality that was a no go. Read More


WHITE PAPER: Juniper Networks

Advancing the Economics of Networking
Aging network systems and old habits have dictated how businesses spend their IT budgets. As a result, a large percentage, if not a majority, of IT dollars are being spent to merely "stay in the race" and keep pace with the competition. Juniper Networks® proposes to change this economic model. Find out how

WHITE PAPER: Zscaler

How Hackers are Targeting Enterprise Users via Web 2.0 Browser Exploits
Securing enterprise servers with firewalls and intrusion detection is critical, but the most common threats are executed on thousands of mobile end users through the Web. Lean how to protect your clients with more than desktop anti-virus/anti-spyware and HIPS. Learn more!

Cisco, NetApp, VMware team up on virtualization security
Cisco, NetApp and VMware announced a project to improve the security of virtualization deployments, with a focus on isolating applications that use the same physical network, server and storage resources in multi-tenant systems. Read More

Nebraskan pleads guilty to 2008 Web attack on Scientologists
A 20-year-old man from Nebraska has agreed to plead guilty to charges stemming from a January 2008 attack on Web sites of the Church of Scientology. Read More


WHITE PAPER: Force10

Three Steps to Saving with Cloud Computing
Discover how cloud computing dynamically streamlines your infrastructure, delivering freely scalable application service levels; dramatic capital and operational cost savings; flexibility and agility without new hardware; and more. Read Now!

NASA Mars Rover Spirit ends one mission to start another
After weeks of trying to trying to get its Mars rover Spirit out of a sandtrap, NASA today said it was resigned to leaving the rover in place and making adjustments to help it survive as a remote but stationary science robot. Read More

Virus comes back from dead to hit hard drives
A 'prank' worm that started as an attack targeted at an off-road Slovakian motorcycle club has escaped beyond its intended victims and started wrecking hard disks as far away as the US. Read More


WHITE PAPER: WatchGuard

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

F5 adds SSL VPN to its Big-IP
F5 Networks has added a new member to its Big-IP application delivery family that combines SSL VPN security with existing access control and WAN optimization, enabling businesses to eliminate VPN gateways. Read More

Smart phone security management a ripe market
The number of smart phones protected by advanced security software will increase fivefold over the next five years as IT departments seek out mobile device management services to deal with functionality that is more and more like that of the desktop, according to a recent report from ABI Research. Read More

iPhone Hacker Cracks the PlayStation 3
Up to this point, just about every gaming console--from the Xbox 360 to the Nintendo DS--has been hacked in some way, usually to allow it to play pirated games. This excluded the PlayStation 3, which remained unhacked for over three years, leading many to believe that it is virtually impossible to hack. Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Are two routers enough to study for the CCNA? On Microsoft Subnet: AxCrypt: Open Source tool for encrypting files; On Google Subnet Google's reports blockbuster Q4, modest FY09.

SLIDESHOWS

Gotta start somewhere
What were the first products from today's biggest tech companies? Take the quiz.

2010's 25 geekiest 25th anniversaries
Our fourth annual compilation of the current year's most notable technology-related 25th anniversaries.

MOST-READ STORIES

  1. Life after Windows: What happens to tech if Microsoft dies
  2. Cisco announces changes to CCNP
  3. Cloud storage hype: Customer not buying it
  4. With emotion, Sun's long goodbye nears the finish
  5. How to solve Rubik's Cube without peeling the stickers
  6. Data breach costs top $200 per customer record
  7. Apple 'iSlate': IT pros ready to buy, if the price is right
  8. The blind side: What net monitoring tools don't see
  9. Cisco, Net App, VMware team up on virtualization security
  10. MIT creates picture-driven programming

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments:

Post a Comment