Wednesday, January 22, 2014

Cisco study find unprecedented growth in threats

Cisco offers advice on Target breach | TWCBC Adds SIP Trunking; Panterra Introduces File-Sharing With Built-In UC

Network World Cisco

Forward this to a Friend >>>


Cisco study find unprecedented growth in threats
Cisco says there's been an unprecedented growth in advanced attacks and malicious traffic on networks, with overall vulnerabilities and threats reaching their highest levels since 2000. This is one of the findings in Cisco's 2014 Annual Security Report issued this week. Read More


WHITE PAPER: Silver Peak Systems, Inc.

The Differences Between Network Memory & Application Caching
Enterprises require an application acceleration solution that spans all types of traffic, one that is easy to manage, and 100% data coherency when supporting business-critical applications. This white paper will address these issues and offer a solution that addresses these enterprise requirements. Learn more >>

WHITE PAPER: Network Instruments

Your Guide to Troubleshooting VoIP
Real-time voice communications are sensitive to delay and variation in packet arrival times. This paper guides you through the essentials of VoIP troubleshooting, including common problems as well as the metrics you should employ to fix and prevent them. Learn More

Cisco offers advice on Target breach
In the wake of the Target and Neiman Marcus data breaches, Cisco suggests encryption at the point-of-sale terminal. Read More

TWCBC Adds SIP Trunking; Panterra Introduces File-Sharing With Built-In UC
With over half a dozen UC-related announcements so far in the last few days, today we'll hit the highlights with three news items: Time Warner Cable Business Class (TWCBC) has added SIP (Session Initiated Protocol) Trunking to its portfolio, PanTerra has introduced a file-sharing service with built-in unified communications, and Fonality reported solid growth for its UC business in 2013. Read... Read More


WHITE PAPER: 8x8, Inc

Scale Communications to Rival Big Companies
Small and midsize businesses looking to minimize telecommunications spending should consider a hosted UC service. This paper highlights: • How to offload significant upfront capital expenses • On-premise vs. cloud UC tradeoffs • Side-by-side pricing comparison of hosted UC service and IP PBX Learn more >>

NASA: Space station dodged debris 16 times in past 15 years
NASA recently wrote that the International Space Station has, during its first 15 years of operations, made 16 space junk collision avoidance maneuvers and been closely threatened another four times. Read More

The Cybersecurity skills gap is worse than you think
Read More


WHITE PAPER: 8x8, Inc

Scale Communications to Rival Big Companies
Small and midsize businesses looking to minimize telecommunications spending should consider a hosted UC service. This paper highlights: • How to offload significant upfront capital expenses • On-premise vs. cloud UC tradeoffs • Side-by-side pricing comparison of hosted UC service and IP PBX Learn more >>

Top 25 most commonly used and worst passwords of 2013
All the website breaches and endless warnings about the use of weak passwords finally soaked in and resulted in a change to the most commonly-used and worst password on the Internet, which was "password". But before you get too excited about netizens embracing better cybersecurity habits, know that "123456" is #1 and "password" fell to #2 on the list of top 25 worst passwords of 2013. Read More

Great gear you may have missed
Read More

10 Most Telecommuting-Friendly Tech Companies
If you're looking for a job that allows (or even encourages) telecommuting, these 10 tech companies are the places to begin your search. Read More

The 8 Most In-Demand Big Data Roles
As more organizations begin to get on the big data bandwagon, demand for IT professionals with the skills to collect, organize, analyze and architect disparate sources of data is on the rise. Read More


SLIDESHOWS

30 years of Apple's Mac computer

A visual history of the Mac..

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 12 toughest U.S. cities for tech recruiting

2. 10 oddball real-world tech job interview questions

3. 14 steps to a better, faster Windows laptop

4. The hottest Chinese Internet firms you've never heard of

5. This Raspberry Pi Tablet is absolutely gorgeous

6. HP sticks thumb in Microsoft's eye, discounts consumer Windows 7 PCs

7. Watch out Amazon: What IBM's $1.2B cloud investment really means

8. SDN will never happen, says VMware exec

9. Firewall start-up Aorato sniffs out Active Directory anomalies

10. Top 25 most commonly used and worst passwords of 2013


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment