Search This Blog

Thursday, April 08, 2010

'Cyber War' author: U.S. needs radical changes to protect against attacks

Targeted cyberattacks test enterprise security controls | From Cyber War: The Next Threat to National Security and What to Do About It

Network World Security

Forward this to a Friend >>>


'Cyber War' author: U.S. needs radical changes to protect against attacks
Ex-Presidential advisor Richard Clarke writes: "U.S. military is no more capable of operating without the Internet than Amazon.com would be." Read More


WHITE PAPER: Cisco Systems Inc.

Improve Productivity by Optimizing your SSL VPN
Are you getting all you can from your SSL VPN? Read this whitepaper to find out Learn More

E-GUIDE: APC by Schneider Electric

5 Ways to Shrink a Data Center
Most data centers can support an average density of 100 to 200 watts per sq. foot. The future of high-density computing – beyond 30 KW - will have to rely on water-based cooling, but is that cost effective? This expert guide discusses the latest energy technologies for today and the future. Read Now.

Targeted cyberattacks test enterprise security controls
Targeted cyberattacks of the sort that hit Google and more than 30 other tech firms earlier this year are testing enterprise security models in new ways and pose a more immediate threat to sensitive data than a full-fledged cyberwar. They're also an "existential threat" to the U.S., a top FBI official said last week. Read More

From Cyber War: The Next Threat to National Security and What to Do About It
Cyber war is not some victimless, clean, new kind of war that we should embrace. Nor is it some kind of secret weapon that we need to keep hidden from the daylight and from the public. For it is the public, the civilian population of the United States and the privately owned corporations that own and run our key national systems, that are likely to suffer in a cyber war. Read More


WHITE PAPER: Dell

Automating Processes to Optimize a Windows 7 Deployment
Experts state that it is critical that planning for Windows 7 starts in the first half of 2010. With the cost per PC deployment estimated at $527-$700 per client, automating processes and leveraging outside expertise can reduce deployment costs and free your staff. Learn More Now

What South Park has taught us about technology (slideshow)
Facebook is just the latest high-tech South Park skewering: iPhone, Bill Gates, Star Trek, the Internet all get lampooned Read More

21 critical future NASA missions
NASA space plans include trips to Mars, Jupiter, Pluto and the Sun as well as climate change operations Read More


WHITE PAPER: AccelOps

IT Service Management: Beyond the Myths
Discover best practices and supporting technologies that deliver the straightest path to service reliability, operational efficiency and effective ROI. Also, examine three case studies that show how IT service management works in the real world. Read More!

Who's responsible in the battle for Internet freedom
Who is legally responsible for the content of materials posted electronically via services such as value-added networks (the predecessors of the World Wide Web such as CompuServe, Prodigy and AOL) and the Web itself? Read More

Mozilla wants to know what the Open Web means to you
What, exactly, is the Open Web?Whether it means an Internet where all content is free or an online existence where all software is a simple no-charge download away, the Mozilla Foundation is trying to figure out just what the Open Web means to people. To Mozilla, it means: Read More

Think tank ponders war in cyberspace
When one nation launches a missile at another, it's easy to pinpoint the aggressor. But during a cyber attack, the aggressor may not be so identifiable, and the traditional rules of warfare don't quite fit. Read More

Data loss a mystery for many businesses
Despite the increasing awareness of penalties and the damage that losing personal data can do to corporate reputations, network security executives are getting less certain that they can figure out if personal data has been compromised when corporate laptops are lost or stolen. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. Cisco launches new servers, switches, SANs
  2. Wormy attack could spread via PDF
  3. How the FCC can still move on net neutrality
  4. Ruling suggests limits on employer's access to personal e-mail
  5. From Cyber War: The next threat to national security
  6. Verizon follows Comcast lead on IPv6
  7. Enterprise cloud put to the test
  8. Is the U.S. the nation most vulnerable to cyberattack?
  9. Tech euphemisms: What those error messages really mean
  10. The iPad and accessories: What you need to know

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: