Tuesday, November 20, 2012

Adobe to fix Flash Player on Patch Tuesdays

  The Ninth Annual Gibbs Golden Turkey Awards | CONNECT: Networky gift ideas for the holidays
 
  Network World Security

Forward this to a Friend >>>


Adobe to fix Flash Player on Patch Tuesdays
Adobe's schedule for issuing security updates for Flash Player will now coincide Microsoft's Patch Tuesday schedule. Read More


RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

WHITE PAPER: F5 Networks

Three Steps That Protect Against DDoS Attacks
Application-layer DDoS attacks are becoming more complex, frequent, and damaging. This paper looks at 3 application protections steps you can apply to defend against malicious connections and keep attackers from overwhelming applications and taking down servers. Learn More.

The Ninth Annual Gibbs Golden Turkey Awards
For the ninth time, Gibbs hands out awards to those on the path to Failsville Read More

CONNECT: Networky gift ideas for the holidays
Opening a new gadget for the holidays isn't any fun if you can't connect to the InterWeb or other devices. Sometimes you need to upgrade your network, and they often make great gifts, too! Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Live Webcast: Thursday November 29th at 2:00pm Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Some smart electricity meters are stupid about privacy
Researchers at the University of South Carolina have discovered that some types of electricity meters broadcast unencrypted information that eavesdroppers could use to determine whether a home is occupied or not. Read More

Be a hero for the holidays
Peruse through Network World's 2012 version of the cool yule tools. Read More


WHITE PAPER: Dell SonicWall

Why Protection and Performance Matters
Outdated firewalls can pose serious security risks and simply adding malware protection inhibits performance. Dell SonicWALL Next-Generation Firewalls overcome these limitations with multi-core architecture and Reassembly-Free Deep Packet Inspection for unrivaled protection and performance. Read Now!

The Grill: Healthcare CIO Catherine Bruno
Catherine Bruno, vice president and CIO of Eastern Maine Healthcare Systems, is also executive sponsor of the Bangor Beacon Community grant program, which brings together a dozen local healthcare organizations focused on improving healthcare while reducing costs through the use of IT. Read More

30 years later, it's an unimaginable hack
Even back in 1982, the astonishing emergence of a large black weather balloon from beneath the field during the annual Harvard-Yale football game was enough to have police officers drawing their guns. Read More

Murder suspect and fugitive John McAfee defends himself via blog
John McAfee, the security software pioneer who is wanted in connection with a murder in Belize, has launched a blog to defend himself while on the lam. Read More

'Bring your own services' is the next big thing not to worry about
CIOs often complain that the bring-your-own-device (BYOD) movement is undermining their ability to keep their infrastructure and data secure. Every employee who comes to work with his or her smartphone or tablet and pulls up sales reports, help tickets and other corporate data creates a small hole in the armor companies have spent billions to build. Over time, the argument goes, the holes become a dangerous sieve. Read More

 
 
 

SLIDESHOWS

How to set up secure Wi-Fi for BYOD
QuickConnect and XpressConnect offer cloud-based methods to automate BYOD client configuration and connection.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 17 eye-popping Black Friday tablet, computer and smartphone deals
  2. Cisco blockbuster: Acquiring cloud network company Meraki for $1.2B
  3. Who has the most 4G coverage?
  4. iPhone 6 rumor rollup for the week ending Nov. 16
  5. 10 types of tablet users that drive us nuts
  6. 2013 IT salaries: 15 titles getting the biggest pay raises
  7. Huawei aims for global domination
  8. General David Patraeus used clever Gmail trick during affair
  9. 30 years later: Imagine if the famous Harvard-Yale football game balloon prank was tried this Saturday
  10. Palo Alto Networks founder: Our competitors are on 'death row'
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment