Tuesday, June 14, 2011

All the news that hits the print

MIT: Wireless jamming system secures electronic medical implants | CitrixTV: Banking on security via virtual computing

Network World Security Strategies

Forward this to a Friend >>>


All the news that hits the print
One of the problems facing security personnel is that the number of  published reports on vulnerabilities, exploits and successful attacks is growing so fast that it's difficult to keep up. Read More


WHITE PAPER: Extreme Networks

Networks in Motion
Download this whitepaper today and discover how you can cost-effectively optimize your network for the mobile demands of today's business. Examine how IT can provide: * Personalization and intelligence. * Ease of operation. * Seamless quality of user experience. * Secure on-the-go access to public and private networks. Read now!

WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

MIT: Wireless jamming system secures electronic medical implants
Researchers from MIT and the University of Massachusetts-Amherst in August will show off a security system they say will prevent anyone from hacking into medical implants such as heart defibrillators or pacemakers to alter operation or steal personal information. Read More

CitrixTV: Banking on security via virtual computing
CitrixTV: Banking on security via virtual computing PARTNER CONTENT: In addition to agility and freedom of choice for users, virtual computing delivers unprecedented options to secure data while making it universally available. This CitrixTV clip provides more details. From: networkworld Views: 5 0 ratings Time: 02:24 More in Science & Technology Read More

Laptop Thieves Stopped! Amazing Recovery Stories
If you've ever lost a laptop or had one stolen, you know what an awful feeling it leaves behind. But a new breed of laptop security software is turning the tables on thieves, giving owners and police a fighting chance of recovering the missing property and sometimes even bringing thieves to justice. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

Cloud security case 1: Mohawk Fine Papers
Paul Stamas won't deny that cost savings, elasticity and agility are all benefits of cloud computing. However, the CIO at Mohawk Fine Papers would argue that these benefits are not by themselves sound reasons to make the move to the cloud. The conversation, he says, begins and ends with the business context. Read More

Cloud security case 2: BuildFax
For Joe Emison, vice president of R&D at BuildFax, scalability was the main motivator for moving the company's infrastructure to the cloud. But once there, Emison says, it quickly became apparent that IaaS was also a boon to security. Read More

Cloud security case 3: Inavero
By now, many people understand that the cloud is not one thing but a variety of possible architectures and options. Nathan Goff, operations director and partner at Inavero, can attest to the truth of that. Goff is using a wide range of cloud offerings from Rackspace, including its IaaS, platform-as-a-service (PaaS) and managed-host offerings. Read More


WHITE PAPER: Raritan

Data Center Transformations
Build outs, consolidations and acquisitions are large-scale projects that can be very disruptive and require careful planning and implementation to maintain operations. This white paper examines the process and what's required to meet IT goals and objectives and maintain business continuity. Read now!

PlayBook OS updated after Adobe Flash security issue
A new version of the BlackBerry Tablet OS will soon be available to all BlackBerry PlayBook tablet users, to address a security issue raised by Adobe about its Flash Player, Research In Motion said Sunday. Read More

Trend Micro takes aim at stealthy hackers stealing secrets
Trend Micro says it can catch hackers in action breaking into networks and trying to steal secrets with a new line of line of network-analysis tools and security services. Read More

Data loss hits vast majority of businesses: survey
Data loss is rampant among businesses worldwide, with the most common cause of losses being lost or stolen equipment, according to a survey. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

10 SaaS companies to watch
These days, companies are applying the software-as-a-service (SaaS) model to just about everything, from core business functions, including IT, to industry-specific processes. This list, compiled with the help of SaaS trend watchers and users, provides a representative look at what types of software you'll find offered in the cloud.

MOST-READ STORIES

  1. Ubuntu breaks from the Linux pack
  2. Big questions about cyberwar
  3. IPhone 5 rumor roundup for the week ending June 10
  4. Share Netflix? Share a jail cell
  5. The top hidden features in Windows 8
  6. Cisco's credibility problems
  7. Trend Micro takes aim at stealthy hackers stealing secrets
  8. Avaya sets $1 billion public offering
  9. Five things we love and five things we hate about Ubuntu 11.04
  10. Microsoft's Office 365 not ready to leave beta, analyst says

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment