Tuesday, July 01, 2014

10 disturbing attacks at Black Hat USA 2014

Hadoop distributor MapR gets $110M from Google | Cloud and on-premises Microsoft email faced off in LA County: Guess who won

Network World Cloud Computing

Forward this to a Friend >>>


10 disturbing attacks at Black Hat USA 2014
Attacking car systems, Google Glass for password theft, using free cloud trials to launch botnets. Black Hat 2014: Is nothing safe? Read More


RESOURCE COMPLIMENTS OF: IT Roadmap Boston

IT Roadmap Boston – 7/17 Register Now!
IT Roadmap is the one day, cost free, professional-level conference and expo that's full of job-ready solutions you can put to work now. IT Roadmap Boston is the place where IT leaders come to explore high-priority IT issues -- and learn how to meet today's requirements for anytime, anywhere business interactions. Click to continue

WHITE PAPER: BMC Software

Making the Move to a Cloud-Based ITSM Platform
Today's mature cloud-based ITSM solutions can give you the flexibility and agility you need—without sacrificing security, stability or performance. Learn More

Hadoop distributor MapR gets $110M from Google
MapR, which distributes a commercial software platform based off the Apache Hadoop big data management open source project, has secured a $110 million funding round led by Google. Read More

Cloud and on-premises Microsoft email faced off in LA County: Guess who won
In a scenario illustrative of Microsoft's tectonic shift to the cloud, Los Angeles County halted an on-premises Exchange upgrade to instead roll out Office 365 and its Exchange Online service. Read More

Avoid the gotchas of Office 365 migrations
Migrating to Microsoft's Office 365 from an on-premises Office suite requires help, experts say, in order to navigate the vagaries of moving apps smoothly to the cloud, a task made more challenging if the transition is from alternatives such as GroupWise and Lotus SmartSuite. Read More


WEBCAST: HP

Meg Whitman presents Unlocking IT with Big Data
Today, the industry is at an inflection point - driven by a triple storm of Big Data, cloud, and mobility; and in this new environment, security is paramount. The New Style of IT is about how businesses and IT leverage this rapid change for enterprise growth. Learn More

Databricks takes on Google streaming analysis with Spark
Taking on Google, Databricks plans to offer its own cloud service for analyzing live data streams, one based on the Apache Spark software.Databricks Cloud is designed to provide a platform for analyzing streaming data, much like the Google DataFlow service announced last week. Read More

10 security start-ups to watch
Security start-ups arise because they have fresh approaches to fighting malware and cyber-espionage or combatting the insider threat through network monitoring. In this round-up of some of the newer security firms, Distil Networks, Observable Networks and Vectra Networks fit into that category. But two others just out of the gate, Exabeam and Fortscale, are part of another trend—squeezing more out of existing log management and security information and event management products. Read More

SIP global roll-out to accelerate through 2019
SIP roll-out has picked and, by 2019, SIP worldwide traffic could be more than double today's volume. While 30% of worldwide network traffic today moves with the use of SIP, in 2019 76% of outbound call traffic will be SIP. Read More


WEBCAST: IBM

The Next Generation of Big Data
Learn about IBM's new and expanded Information Management capabilities now delivered in the cloud. Learn More

Armed with new CEO, Joyent rolls out a private cloud
Last week was a big one for IaaS cloud provider Joyent - not only did the company pivot to offer a private cloud management software (previously it only offered public cloud services) but it also has cherry-picked a Cisco cloud executive to be the company's new CEO. Read More

Microsoft botched all aspects of Exchange outage response
Microsoft blew it Tuesday when its Exchange Online hosted email service went dark for much of the business day, an expert said. But he wasn't referring to Exchange's technical failure. "Three hundred and sixty-four days of excellent service can be undone on the 365th if a company doesn't communicate effectively," said Gene Grabowski, senior strategist at Levick, a Washington, D.C. firm that specializes in crisis communications. Read More

Hackers found controlling malware and botnets from the cloud
In what is considered to be a natural evolution of tactics used by cybercriminals to infiltrate corporate networks, security firm Trend Micro has new evidence that more botnets and malware are being not only hosted in the cloud, but controlled remotely from cloud servers. Read More

Mark Hurd lays out Oracle's cloud progress, plan to be number one
Being second isn't good enough for Oracle when it comes to cloud revenue, co-president Mark Hurd told investment analysts this week following the company's fourth-quarter and year-end earnings report. Read More


SLIDESHOWS

10 disturbing attacks at Black Hat USA 2014

Attacking car systems, Google Glass for password theft, using free cloud trials to launch botnets, more.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 Bad Coding Practices That Wreck Software Development Projects

2. HP's giant Proliant challenges big iron from IBM, Oracle

3. FBI warns businesses "Man-in-the-E-Mail"

4. iPhone 6 rumor rollup for the week ending June 27

5. Why One CIO Is Saying 'No' to BYOD

6. 17 obscure Windows tools and tricks too powerful to overlook

7. The top 10 Windows 8 questions everyone asks

8. SDN: The next steps

9. Cisco acquires tiny collaboration company

10. Avoid the gotchas of Office 365 migrations


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cloud_computing_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment