Wednesday, November 14, 2012

Review: 6 slick open source routers

  DHS aims to hire 600 cybersecurity pros -- if it can find them | Cisco's Chambers downplays danger of trade war over Huawei
 
  Network World Daily News AM

Forward this to a Friend >>>


Review: 6 slick open source routers
DD-WRT, Tomato, OpenWRT, M0n0wall, PfSense, and Vyatta suit a wide range of devices and networking needs Read More


RESOURCE COMPLIMENTS OF: PhoneFactor

A Significant Shift In Multi-Factor Authentication Strategy
Escalating IT security threats and strengthening regulatory requirements are driving multi-factor authentication adoption to unprecedented levels. Increasingly implementations are leveraging phone-based authentication instead of hardware security tokens. In fact, analysts report phone-based authentication will comprise 61% of the market by 2014. Download The Authentication Revolution whitepaper to understand the key drivers for this market shift, including real world case studies from organizations that have made the move to PhoneFactor's phone-based multi-factor authentication.

RESOURCE COMPLIMENTS OF: Mobiquity Inc.

The Holy Grail of Mobility: Behavior Change
We all do it. Skip taking meds. Put off seeing our doctor. Eat what we shouldn't. People with diabetes can put their lives in danger doing these things. That's why WellDoc's app, DiabetesManager, is such a great case study for learning how to change behavior. It's so effective the FDA approved the app as a medical device. In this podcast, Anand Iyer, president of WellDoc, and Mobiquity customer, lets you in on the app's development and why it works so well. Learn how you can apply behavior change to your business.

DHS aims to hire 600 cybersecurity pros -- if it can find them
Experts say Department of Homeland Security recruitment suffers from lack of understanding of talent pool Read More

Cisco's Chambers downplays danger of trade war over Huawei
The U.S. and China are likely to resolve the conflict over potential security threats from Huawei Technologies' network equipment without a trade war, Cisco Systems chairman and CEO John Chambers said on Tuesday. Read More

Startup debuts with cloud-based open-source identity and access management software
Startup ForgeRock makes its official debut today with cloud-based open-source identity and access management (IAM) software called Open Identity Stack intended to be used by enterprises and service providers to enable centralized provisioning and access management to enterprise, mobile and software-as-a-service applications. Read More


RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

NSA: Looking for a few good cybersecurity professionals
At a time when cyberattacks on America's critical infrastructure have increased 17-fold (between 2009 and 2011), the need for highly trained cybersecurity professionals is acute. However, 83% of federal hiring managers in a recent survey said it was extremely difficult to find well-trained cybersecurity professionals and a projected shortfall of 20,000 to more than 40,000 people is expected in the years to come. Read More

AMD denies reports company is for sale
Advanced Micro Devices is denying reports that executives have taken steps that could lead to the company's sale. Read More

FAQ on Sinofsky's departure from Microsoft
In a stunning move, Microsoft has announced that the man who oversaw the creation of Windows 8, Windows phone 8 and the Microsoft Surface tablets is leaving the company. Here are some questions and answers about the move. Read More


WEBCAST: Fluke Networks

Solve QoS Problems in VoIP Call Centers
View this short video "Maintaining High VoIP Quality for Call/Contact Centers with Network Time Machine", to learn more about how carrier and call center customers are using Network Time Machine to rapidly determine problem domain and identify choke points in the network. View Now!

Google: Gov't spying spiked & Microsoft leads the pack for copyright complaints
The United States is leading the race, but in this case, it's a very bad thing. The race is actually "government requests for disclosure of user data from Google accounts or services." The USA comes in first in government snooping with a total of 7,969 user data requests from January to June 2012, but that was tied into 16,281 user accounts. Google complied fully or at least in some degree with 90%... Read More

Phishing attack targets CloudFlare customers
Customers of the popular CloudFlare website acceleration and security service were targeted in an email attack that directed them to a fake version of the website. Read More

Attention shoppers: Patch Internet Explorer immediately before you shop online
Today is the eleventh Patch Tuesday of 2012, but the first since the official launch of Windows 8 and Windows RT. There are six new security bulletins--a couple of which are particularly urgent, especially for anyone planning to do any online shopping this holiday season. Read More

Adobe investigates alleged customer data breach
Adobe said Wednesday it is investigating the release of 230 names, email addresses and encrypted passwords claimed to have been stolen from a company database. Read More

iPhone to Android: How to make the switch
If the Galaxy S III or other smartphone tempts you, here's how you can still fit it in Apple's ecosystem Read More

 
 
 

SLIDESHOWS

How to set up secure Wi-Fi for BYOD
QuickConnect and XpressConnect offer cloud-based methods to automate BYOD client configuration and connection.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Antivirus pioneer John McAfee reportedly wanted for murder in Belize
  2. Microsoft shocker: Windows 8 chief Steven Sinofsky out
  3. The 10 most powerful supercomputers on the planet
  4. Facebook crowd adds insult to Romney's injury
  5. Palo Alto Networks targets VMware shops with virtualized next-gen firewalls
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. 2013 IT salaries: 15 titles getting the biggest pay raises
  8. OpenFlow startup takes aim at Cisco, VMware
  9. How to earn a living making Open Source software
  10. 6 tools to manage large file transfers
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment