Search This Blog

Monday, February 03, 2014

Five tips from a CIO on dealing with massive DDoS attacks

Shadow IT: Boon or burden? | iOS vs. Android: Which is more secure?

Network World IT Best Practices

Forward this to a Friend >>>


Five tips from a CIO on dealing with massive DDoS attacks
LiveJournal is a social-media blogging site that attracts millions of users each month from across the globe, especially the U.S. and Russia. Owned by Moscow-based SUP Media, its website is hosted in a Montana data center, and according to Tim Turner, the firm's London-based CIO, LiveJournal regularly faces massive distributed denial-of-service (DDoS) attacks. Read More


WHITE PAPER: Limelight Networks

Why Web Site Performance Is an IT Imperative
A slow or inefficient Web site can have a direct impact on your business. Recently, IDG Research explored the challenges enterprises face in delivering content across multiple devices. Find out how adjusting to these challenges while meeting performance objectives has become a top concern for senior IT managers. View Now

WHITE PAPER: HP and Intel®

Storage Insight: Debunk the Data Storage Myths
Of all the obstacles standing in the way of building a better IT infrastructure, misinformation may be the most daunting. This informative eBook is designed to provide the immediate insight you need to make the right decisions about some of the most important IT issues your enterprise will ever face. Read Now>>

Shadow IT: Boon or burden?
Join our tech debate on this topic: Shadow IT is defined as IT systems and/or services brought into the organization without IT approval. While it is often perceived as sneaky and potentially dangerous, some contend that Shadow IT can lead to innovation and increased productivity and efficiency. Read More


WHITE PAPER: IBM

Best Practices for SPSS on Power Systems
Organizations adopting the IBM SPSS Collaboration and Deployment Services 4.2 can be affected by many variables. Read the white paper which explores the best practices and characteristics of running the software on a POWER7 platform, and learn how this can influence performance optimization and scalability. Learn More

iOS vs. Android: Which is more secure?
With millions of new iOS and Android devices pouring into the enterprise every quarter, it's important to know just how much risk these devices bring -- and if one mobile operating system has an edge over another when it comes to securing enterprise applications and data. Read More


WEBCAST: VCE

Vblock™ Specialized System for SAP HANA®
Deploy SAP HANA® fast and with low risk. VCE brings together all of the necessary components for SAP HANA® into a single, standardized converged infrastructure system to ensure maximum performance at scale even with high data volumes. Learn More

Video explainer: What is net neutrality?
Video explainer: What is net neutrality? With net neutrality in the news, we'll give you a quick explanation of this complex topic. From: Network World Videos Views: 0 0 ratings Time: 01:16 More in Science & Technology Read More

Internet of Things in five words: sensor, monkey, radio, cloud, Paris
If you want to build your own Internet of Things, try the toy monkey hack. Read More

Mobile security management that goes beyond MDM
Many enterprises are still hesitant to officially embrace BYOD because of security concerns for data and applications. A new entrant in the mobile security market offers a fairly comprehensive array of security features. Marble Security focuses on protecting corporate assets by blocking risky behaviors and ensuring a secure network connection. Read More


SLIDESHOWS

FIRST LOOK: New Cisco Nexus switches

Cisco extends its Nexus data center switching line.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. MacGyver IT: 21 tools for IT heroes

2. Report: Microsoft may boot Gates as chairman, replace Ballmer with Nadella as CEO

3. Report has IBM looking to exit SDNs

4. Feds grab 163 web sites, snatch $21.6 million in NFL counterfeit gear strike

5. Ex-network engineer faces prison after admitting he sabotaged employer's system

6. Old-school Wi-Fi is slowing down networks, Cisco says

7. FCC moves toward IP transition of phone networks

8. Best practices for network security management

9. Cisco's SDN defense takes a hit

10. GoDaddy owns up to role in Twitter account hijacking incident


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: