Tuesday, November 19, 2013

VMware and Palo Alto team to more quickly secure virtual resources

The security industry remains strong with computer science, but weak on IT | Google to warn users of 13,000 search terms associated with child pornography

Network World Security

Forward this to a Friend >>>


VMware and Palo Alto team to more quickly secure virtual resources
In connection with its NSX network virtualization software effort, VMware is teaming with Palo Alto Networks to jointly develop a virtualized network-generation firewall (NGFW) tightly integrated with VMware's platform. Read More


WHITE PAPER: Ipanema Technologies

Don't Let App Performance Problems Drag You Down
Did you know: 73% of enterprises lose productivity due to poor application performance? And that's just the beginning of the issues resulting from poor application performance. Check out this exclusive IDG-Ipanema survey to learn about the far-reaching impacts of poor application performance, and what you can do about it. Learn More.

RESOURCE COMPLIMENTS OF: SolarWinds

New Video: How to Configure NetFlow v9 on a Cisco Router
Networks can grow fast—really fast. This rapid growth leads to increased network traffic, more endpoints, and new IPs consuming bandwidth. Key to a complete understanding of network behavior at your growing organization is the ability to collect and analyze NetFlow data in your routers. SolarWinds new video shows you how, in less than 5 minutes! Looking to enable Flexible NetFlow on your Cisco routers? In less than 5 minutes, SolarWinds lead Sales Engineer demonstrates how to enable NetFlow v9 on Cisco routers with custom flow records. Watch the short how to video now!

The security industry remains strong with computer science, but weak on IT
Last week, I was in Silicon Valley meeting with a parade of CISOs and security vendors. Business travel is no "day at the beach," but these trips really help me keep up with the latest enterprise security challenges and potential technology solutions. It was also nice to spend time in the Valley and re-charge my batteries toward the security industry. There was a lot of excitement out there as... Read More

Google to warn users of 13,000 search terms associated with child pornography
Google will display warnings above the search results for 13,000 terms it believes are associated with more explicit child sexual abuse terms, it announced Monday. Microsoft said it will take similar action on its Bing search engine, and on Yahoo searches powered by Bing. Read More

Quick look: NASA's Mars MAVEN mission
NASA mission is first to explore upper atmosphere of red planet Read More


WEBCAST: IBM

Webinar: IBM IIM for Fraud, Abuse and Waste in Government
View this IBM webinar to learn about the challenges and opportunities in fraud reduction, waste, and abuse in government programs and agencies. You will learn how IBM Intelligent Investigation Manager (IIM) can help your organization. Learn More.

How cops and robbers are using Google Earth
Law enforcement and criminals have both used Google Earth and Google Maps to commit and solve real-world crimes. Read More

Hackers claim they used zero-day vulnerability to breach vBulletin support forum
A group of hackers claim to have exploited an undocumented vulnerability in the vBulletin Internet forum software in order to break into the MacRumors.com and vBulletin.com forums. Read More

Hackers actively exploiting JBoss vulnerability to compromise servers, researchers say
Attackers are actively exploiting a known vulnerability to compromise JBoss Java EE application servers that expose the HTTP Invoker service to the Internet in an insecure manner. Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Gift Guide 2013: Games and gaming gear
Let's face it - this holiday season is going to be really good for the video gamer on your holiday list. Not only are there two new gaming consoles coming out (the Xbox One and Sony Playstation 4), but there are a bunch of games that will keep you entertained for months on end. Plus the accessories to enhance those games and experiences continue to be top-notch. Read More

Gift Guide 2013: Work gadgets
The merging world of personal technology and workplace technology is always a fascinating scene to observe, so a lot of devices here can be utilized at home, and vice versa (see our Digital Life article for home-related tech gift ideas). But for the most part, we're confident that your work life will improve with these gadgets - peruse the writeups for gift ideas for your favorite colleague! Read More

ICANN sets up 'coalition' to address new Internet governance challenges
ICANN has set up a panel, consisting of people in government, civil society, the private sector, the technical community and international organizations, to address concerns about the governance of the Internet. Read More

HP: 90% of Apple iOS mobile apps show security vulnerabilities
HP today said security testing it conducted on more than 2,000 Apple iOS mobile apps developed for commercial use by some 600 large companies in 50 countries showed that nine out of 10 had serious vulnerabilities. Read More


SLIDESHOWS

20 hottest tech toys for the holidays

Cool Yule Tools 2013: Our Tester Elf-approved picks for awesome gadgety goodness.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. The 10 fastest supercomputers on Earth

2. iPhone 6 rumor rollup for the week ending Nov. 15

3. Businesses offer best practices for escaping CryptoLocker hell

4. IT: Don't let the CEO wonder what you do all day

5. Nexus 5 is designed to work on Verizon Wireless, and most other networks

6. Amazon bashes private clouds, launches virtual desktops

7. Security Threat Landscape: Bad BIOS malware concept and CryptoLocker update

8. Microsoft CEO search enters endgame

9. Holiday gift guide 2013

10. 12 hot security start-ups to watch


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment