Search This Blog

Monday, February 04, 2013

Cisco: There’s no place safe for Web surfers

Cisco pushes ahead with context-aware security vision | Porn sites not as risky as search engines or social media: Cisco studies

Network World Cisco

Forward this to a Friend >>>


Cisco: There's no place safe for Web surfers
Web surfers don't have to indulge in risky online behavior to expose themselves to malware, according to Cisco's annual security report. Read More


RESOURCE COMPLIMENTS OF: Network World Technical Seminar

SDN, Openflow and Network Virtualization event comes to NYC
Attend and learn how SDN works, its potential in the enterprise, and why leading, bellwether organizations are leveraging it for data center and large-scale networking efficiency- Learn more and register for this free event. February 12, 2013 – Grand Hyatt, NYC Click to continue

WHITE PAPER: Shoretel

Sophisticated Simplicity
The key is to build simplicity and ease of use into these solutions from Day 1. This white paper will demonstrate a clear path to UC simplicity, and to overall success of UC deployments. Learn more.

Cisco pushes ahead with context-aware security vision
Cisco made two significant security announcements at its Cisco Live conference in London this week, reiterating its commitment to offering an integrated platform for defense, discovery, and remediation of threats. Read More

Porn sites not as risky as search engines or social media: Cisco studies
The highest concentration of online security threats are found in major search engines, retail sites and social media outlets vs. pornography, pharmaceutical or gambling sites. That's the finding of two of Cisco's most recent security studies, where were released this week. Read More


WEBCAST: Exinda

Expert Insights on Building a User Experience Network
Join guest speaker, Forrester Research, Inc. Principal Analyst Andre Kindness and First State Bank IT leader Tristan Smith as they discuss the importance of putting end-users at the forefront of your network design. Learn More.

Check out '2013's 25 Geekiest 25th Anniversaries'
We've been eating our own dog food for 25 years now. That may be the most remarkable fact I have learned from compiling "2013's 25 Geekiest 25th Anniversaries," our seventh annual such collection of (sometimes loosely) tech-related milestones and memories. This marks the seventh consecutive year that I've gone archive diving in this manner. Should you be interested, here are the others. Read More

US wants Amazon, Apple, BlackBerry, Google and Microsoft to get a grip on mobile security, privacy concerns
When it comes to relatively new technologies, few have been developing at the relentless pace of mobile. But with that development has come a serious threat to the security of personal information and privacy. Read More


WHITE PAPER: Ixia Anue

The Evolving Visibility Challenge
Network monitoring has become more complex over the last few years, due in large part to virtualization and convergence. Learn how a state-of-the-art monitoring system that maximizes your existing monitoring tool investment can help you attain greater visibility into your network without adding complexity. Say goodbye to virtual blind spots. Learn More

How BYOD Saved VMware $2 Million
As more companies adopt a bring-your-own-device (BYOD) approach to mobile, many are getting caught by hidden costs. But virtualization titan VMware has bucked that trend. VMware CIO Mark Egan explains how his company accomplished its feat. Read More

HP's building an avatar to manage your mobile connections
Hewlett-Packard researchers are developing a cloud-based "avatar" to manage all of a user's mobile devices and wireless networks. Read More



SLIDESHOWS

13 markets you might not associate with Cisco

Cisco's "Internet of Everything" initiative takes it into unchartered territory.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Amazon.com suffers outage: Nearly $5 million down the drain?

2. The Samsung Galaxy S 4 shows up in New Zealand

3. U.S. takes down 313 websites, snags $13.6 million in counterfeit NFL merchandise

4. 9 iPhone-iPad apps that invade your privacy, and 1 that doesn't

5. Hacker 'sextorted' 350 women into stripping off after stealing embarrassing pictures

6. Microsoft embraces open-source Git for development tools

7. Porn sites not as risky as search engines or social media: Cisco studies

8. Office 365 vs. Office 2013: Should you rent or own?

9. Cisco pushes ahead with context-aware security vision

10. Canadian game developer fired after spoofing call-center workplace


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: