Friday 18 March 2011

Did hackers nab RSA SecureID's secret sauce?

RSA's SecurID security breach: What should you do? | The RSA Hack FAQ

Network World Daily News PM

Forward this to a Friend >>>


Did hackers nab RSA SecureID's secret sauce?
RSA is scrambling to reaffirm that the strength of its SecurID technology is not diminished. Read More


WHITE PAPER: F5 Networks

Load Balancers Are Dead!
Get Gartner's take on: * Which vendors are leading the ADC market * Key recommendations on what you should do today * How to find a feature-rich ADC View the Gartner report, compliments of F5 Networks! Read now!

WHITE PAPER: Internap

Colocation versus Managed Hosting
The practice of outsourcing certain business functions or responsibilities has become more prevalent because it addresses two simple business needs, lower expenses and better allocation of resources. Learn More

RSA's SecurID security breach: What should you do?
RSA's disclosure last night that it has suffered a sophisticated cyberattack in which attackers obtained some type of information about RSA's SecurID product for two-factor authentication is prompting a variety of suggestions in how customers should deal with the problem. Read More

The RSA Hack FAQ
In the aftermath of RSA saying that its SecureID two-factor authentication tokens may have been compromised in a data breach of the company's network, here are some key questions and answers about the situation. Read More

New gadgets, LTE upstarts and data plans on tap at CTIA Wireless
What better way to celebrate the arrival of spring than by showing up in Orlando for CTIA Wireless 2011, which runs March 22-24. The buzz is all about LTE, the mythical "4G" network, the continually promised mobile payments explosion, monetizing the heck out of online app stores, and now... tablets, which manage to bring almost all of these trends, or hopes, together. Read More


WHITE PAPER: HP

A Necessity for the Public Sector
This paper highlights 2010 survey results and reveals the key issues facing these organizations including the serious challenge of managing unstructured data while ensuring security and providing transparency in government. Read More!

7 ways the iPad 2 is better than Motorola Xoom
First came the iPad, which revolutionized the tablet computing market. Late last month, Motorola came out with an Android-based alternative that beats the iPad in a number of areas. Not to be denied, however, Apple just delivered iPad 2, which negates some of the advantages that Xoom claimed over the original iPad. Here are seven ways the iPad 2 is better than the Xoom. Read More

Verizon's LTE network delivers the goods in 4G walking tour of Boston
Since Verizon released its first LTE phone this week -- and since it's a lovely day out -- I decided to spend my morning strolling through Downtown Crossing in Boston and testing out self-proclaimed "4G" smartphones. Read More

A legacy from the 1800s leaves Tokyo facing blackouts
East Japan entered its fifth day of power rationing on Friday, with no end to the planned blackouts in sight. The power shortages began last week when a massive earthquake and tsunami knocked nuclear power stations offline. The local electrical utility can't make up the shortfall by importing power from another region, though, because Japan lacks a national power grid, a consequence of a decision taken in the late 1800s. Read More


WEBCAST: Iron Mountain

Success in the cloud: strategies revealed
View this webcast with IDG senior editor Jim Malone and Martin Tuip of Iron Mountain to learn the primary considerations and best practices for storing, archiving, protecting and managing your most important information in the cloud. View now

The EMC/RSA Breach: What It Means
I have two immediate words with regard to the EMC/RSA breach: Holy smokes! Add the EMC/RSA breach to a list including the Aurora attack on Google, Conficker, and WikiLeaks as extremely frightening cyber security incidents. Can anyone still claim that we aren't extremely vulnerable to cyber crime, espionage, and outright attacks? Read More

NetSuite's CEO cashes in on cloud mania
An exclusive interview with Zach Nelson, CEO of NetSuite, reveals the challenges and rewards of being the leading ERP-as-a-service provider. Read More

VMware's management client for iPad available
VMware has released the vSphere Client for iPad, with which IT staff will be able to monitor and manage their virtualized infrastructure, the company said on Thursday. Read More

SEC charges IBM with bribing Korean, Chinese officials
The SEC charges IBM with giving hundreds of thousands of dollars worth of bribes to South Korean and Chinese officials. Read More

After some tweaking, Air Force set to blast second hypersonic jet
Air Force researchers said they a prepped for a second test run of its X-51A Waverider hypersonic jet which they ultimately expect to hit speeds upwards of Mach 6. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Perks drive up pay for tech CEOs
Many tech vendors have shied away from extravagant perks, but there are still plenty worth highlighting. Like a $1.5 million tab for home security. Or how about the $36,619 one company paid to reimburse its CEO for the taxes he had to pay on the $106,589 he gained by using company aircraft for personal flights? Read on to find out which tech CEOs enjoyed the priciest perks in 2010 and which ones went to work perk-free.

First look at Microsoft Internet Explorer 9
Microsoft has a real competitor once again with IE9, released at midnight Monday night on Windows 7 and Vista after several months of beta testing. The focus is on speed, privacy and simplicity, with a stripped-down interface, tracking protection, pinned sites, jump lists and enhanced support for HTML5.

MOST-READ STORIES

  1. RSA warns SecurID customers after company is hacked
  2. Android violates Linux license, experts claim
  3. HP "beat the crap" out of Cisco, others
  4. Cell phones are 'Stalin's dream'
  5. RSA's SecurID breach: What should you do?
  6. Web users bury Yahoo for botched Nate Dogg obit photo
  7. iPad 2 demand still exceeds supply
  8. Why does U.S. Cen Com want to create phony online identities?
  9. Telecom mogul is world's richest person
  10. Xoom tablet pricing for Wi-Fi model sparks online debate

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment