Wednesday, January 05, 2011

Good times projected for network security market in 2011

Network World Security - Newsletter - networkworld.com
US begins sophisticated wireless jamming project | Sudden spam drop leaves experts baffled

Network World Security


TOP STORY: Good times projected for network security market in 2011
There's some early optimism about the information technology industry as the world steps into 2011. For one thing, the global network security market is expected to be on the rise, according to estimates from IDC, which forecasts a return to the growth of pre-recession levels this year. Read More

WHITE PAPER: Why Organizations Need LTO-5 Today (Quantum Corporation)
For years, tape storage systems have played a key role in efforts to store data for backup and retrieval, archiving, and contingency planning purposes. More recently, tape has been called on to help preserve and safeguard data to meet data retention laws and regulations. Read More

US begins sophisticated wireless jamming project
DARPA wants smart system that can learn to jam new wireless threats automaticallyLooking to begin developing algorithms and other technology to automatically learn to jam certain new wireless transmissions that may threaten US military personnel. BAE Systems recently got about $8.4 million from the Defense Advanced Research Projects Agency to begin work on what's known as the Behavioral Learning for Adaptive Electronic Warfare (BLADE) system. Read More

Sudden spam drop leaves experts baffled
Spam volumes appear to have dropped to averages last seen in 2008 after an expected surge in bogus email over the Christmas period failed to materialise. Read More

WHITE PAPER: 10 questions to ask before you buy an anti‐spam solution (Watchguard)
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

How Goldman Sachs will guard Facebook's privacy
Special 'investment vehicle' likely to draw attention from SEC No one should ever again question Mark Zuckerberg's commitment to privacy ... at least not as it applies to himself, his company, his employees, Goldman Sachs and millionaire investors. Read More

Cisco TrustSec Makes Your Network Identity Aware
Cisco TrustSec technology provides switch to switch wire speed encryption services and security group tagging of ethernet frames. But what it really does is allow you to implement the most robust identity aware network with services on the planet. This technology, if Cisco executes on it properly, could forever change the way we design secure networks. Today's business networks are so open and... Read More

WHITE PAPER: Combating Security and Compliance Challenges (Quest Software)
Don't wait for a security breach or compliance issue to damage your company. Ongoing monitoring can proactively identify and reduce threats. Learn how you can successfully stop security issues before they become serious problems. Read More

Oops, you really shouldn't have seen that … automated redaction for SharePoint content
Electronic redaction software for SharePointWhen you need to remove sensitive information from documents on a regular basis (think Legal, Engineering, or Healthcare environments), manual processes are both tedious and subject to error. I recently got to see a demo of a product that helps quickly and easily redact SharePoint content - Redact-It from Informative Graphics. With Redact-It, the risk of accidentally sharing sensitive information stored... Read More

Dell buys SecureWorks for IT security services
Dell announced Tuesday it is purchasing security services vendor SecureWorks, expanding its range of IT management offerings. Terms were not disclosed. Read More

WEBCAST: Choosing Enterprise Firewall for 2011 & Beyond (Palo Alto Networks)
Firewalls are evolving. Application visibility and control has made its way to the forefront of the requirements list for enterprise firewalls. We are dedicating this episode of 60 Minutes with Nir Zuk to the more practical considerations around choosing an enterprise firewall. Learn more!

Will 2011 signal a Mac virus onslaught? Not so fast
Is it really true that it's only a matter of time before Macintosh users are under siege by a flood of viruses and malware? McAfee announced recently that 2011 would be a bad year for people using Apple computers, as hackers will be increasingly attracted by growing Mac market share. It's not at all hard to find experts who agree. Read More

Top Security Trends of 2010: A Look Back
Computer and network security is a perpetual game of cat and mouse. Attackers are often adept at both following technology and social trends, and adapting attacks to exploit weak points. As 2010 comes to a close, let's take a look back at some of the biggest security trends from the year. Read More


BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

The weirdest, wackiest and stupidest sci/tech stories of 2010
It's hard to pick the weirdest and wackiest tech stories of 2010 considering there is so much nuttiness to choose from. But we'll give it a shot. Here we take a look at a number of stories that gave us pause in 2010.

2010's most popular iPad apps
As the iPad celebrates its first birthday, it should raise a glass to Apple's App Store, which has provided users with an array of innovative applications. Late last week, Apple released a list of the 10 most popular iPad applications, with productivity apps making up the bulk.

MOST-READ STORIES

  1. Espionage via spoofed White House eCard
  2. Wikipedia meets $16M fundraising goal ... the hard way
  3. Oversupply sends DRAM prices to one-year low
  4. CES 2011 Preview: Gadgets galore
  5. 2011 Outlook: Better than 2010 and really wild
  6. Microsoft blames server problem for Hotmail outage
  7. Toshiba to show no-glasses 3D TV at CES
  8. Will there be a jobless recovery for IT in 2011?
  9. Are you ready to flatten your data center network?
  10. How to take your enterprise Wi-Fi network to the next level

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter



You are currently subscribed to networkworld_security_alert as security.world@gmail.com.
Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment