Friday, July 30, 2010

Cisco responds to router hack; Juniper secures Cisco Cius OS

  Juniper secures Cisco Cius OS | A bet on BBCs and VM Mobility

 
  Network World Cisco

Forward this to a Friend >>>


Cisco responds to Black Hat's Million Router Hacker
Jim Duffy: Cisco has posted a blog entry in response to the talk being delivered this week at Black Hat on hacking millions of consumer routers. We blogged on this talk two weeks ago.  Read More
 


ARTICLE: Research In Motion

BlackBerry® MVS. Now with Voice Over Wi-Fi Calling.
Get a cost-effective integrated communications platform with new BlackBerry® Mobile Voice System 5.0. By unifying desk phone features with BlackBerry smartphones, you can save money while giving employees the freedom to work with one business number, caller ID, and voicemail virtually anywhere. Click or visit BlackBerry.com/MVS to learn more.

WHITE PAPER: Insight

How to Double Productivity of Your IT Staff
Examine how Oracle Database 11g helps IT provide more information with higher quality of service, making more efficient use of budgets and reducing the risk of change in data centers. Learn more!

Juniper secures Cisco Cius OS
Jim Duffy: Juniper can now secure Cisco's new Cius tablet thanks to an acquisition it made this week. Cisco's rival announced plans to acquire SMobile, a developer of security software for tablets and smartphones, for $70 million. Read More
 

A bet on BBCs and VM Mobility
Douglas Gourlay: Last week a friend from work bet me I couldn't write an intelligible blog about 'BBCs.' As usual, without thinking too much, I took the bet. Read More
 

Cisco, Juniper, Alcatel-Lucent win AT&T IP domain
Jim Duffy: As expected, AT&T this week named Cisco among its three suppliers for the carrier's IP/MPLS network "domain." The other two are Juniper and Alcatel-Lucent. Read More
 

B is for Botnets
Julie Bort: Today Our Cool Tools Blogger Keith Shaw launched a new video series, "The ABCs of IT." It explains the alphabet of IT terms and hopefully provide some entertainment along the way. Read More
 


Dell's Security Opportunity

Jon Oltsik: This week, Dell announced its entry into the SMB security market with a portfolio of products and services. The initial portfolio is fairly simple, with Dell partnering with others for endpoint security, network security, and security services. Read More

It's Time to Start Loving Tunnels
Michael Morris: I wrote a blog two years ago about how I could fix anything with a tunnel. Yes, it was a tad tongue in cheek, but it also had some truth to it. Read More
 

IPv6 Enabled Web Browsers
Scott Hogg: One way to get your browser to navigate to an IPv6-capable web site is to simply enter the IPv6 address of the web server into the browser's address bar. Read More
 

Making the move to Energy Efficient Ethernet
Bob Brown: I recently interviewed the University of New Hampshire-InterOperability Lab's Jeff Lapak regarding Energy Efficient Ethernet, a pending IEEE standard designed to save companies energy use and money through more efficient network use. Read More
 


WEBCAST: Oracle

Getting Started with Identity Compliance
The Burton Group's, Kevin Kampman, provides an overview of the latest technology for identity management. He'll help you sift through key, mandatory requirements and features and functionality that can wait. Kevin offers guidance on how you can get a 360-degree view of users' access and behavior, best practices and a real-world implementation. View Now.

Happy SysAdmin Day (despite the pay)
Today is System Administrator Appreciation Day, but the IT workers who keep corporate desktops, servers and networks running don't have much to celebrate. Read More
 

Alcatel-Lucent's revenue drops, but operating loss shrinks
Alcatel-Lucent's second-quarter revenue fell 2.4 percent year on year, dragged down by slow sales in fixed-line network equipment and terrestrial optical networks, but the company reduced costs, cutting its operating loss by two-thirds compared to a year earlier. Read More
 

Best practices for cleaning up your firewall rule base
After years of use, the rule bases that drive your network firewalls get unwieldy -- clogged with expired, obsolete, duplicative and conflicting policies. Read More
 

Upshot of the WPA2 brouhaha
We continually draw mental lines between the risks that we just accept as facts of life and those we deem important enough to actively try to mitigate. Read More
 

Visit the Cisco Subnet home page for more Cisco news
The Cisco Subnet community features industry-expert bloggers, giveaways and all the top news of interest to network professionals. This month: 15 copies Cisco Unified Presence Fundamentals and Network Security Auditing up for grabs. Follow us on Twitter @ciscosubnet Read More
 

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: Apple iOS 4 vs. Android 2.2
Apple's iOS has been wowing users for four years in the iPhone and now the iPad. Available in smartphones and now tablets from various vendors going on two years, Google's Android has proven itself to be a strong contender that has the only real chance to surpass iOS.

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. Apple grants ABC access to its secretive "black labs"
  2. WPA2 vulnerability found
  3. Cisco study warns against "FarmVille"
  4. Is Sprint losing its WiMAX/4G gamble?
  5. MIT design could speed up the Internet
  6. Certified lies: Big Brother in your browser
  7. Avaya stares down Microsoft, Cisco
  8. Black Hat too commercial for you?
  9. Mobile deathmatch: Apple iOS 4 vs. Android 2.2
  10. Should you even bother looking at Windows Phone 7?

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment