Monday 16 May 2011

Facebook, Twitter need corporate security policies

Cisco VoIP phones part of security weakness demo | Top 5 things to do before buying more security technology

Network World Security

Forward this to a Friend >>>


Facebook, Twitter need corporate security policies
Social networks such as Facebook and Twitter open threats to sensitive corporate data that businesses need to deal with aggressively, Interop attendees were told. Read More


WHITE PAPER: Diskeeper Corporation

The Efficiency Essentials You're Dead Without
This white paper takes you inside Diskeeper 2011 and clearly shows you why you shouldn't run your network without it. Learn more.

WEBCAST: CA Technologies

Is Your DR Plan Truly Reliable?
No matter how you define a disaster, you need a strategy that provides protection, fast recovery and high availability of your systems, applications and data. Attend this webcast to learn about disaster recovery best practices and the wide range of technologies available to protect your organization. Learn More

Cisco VoIP phones part of security weakness demo
Cisco reaching out to AusCERT 2011 conference and speakers, Microsoft included in VoIP security weakness demo Read More

Top 5 things to do before buying more security technology
Las Vegas --Throwing more technology at security threats as they crop up is not the best way to go if the goal is to protect the most valuable data at the best price, attendees at Interop were told this week. Read More

Enterprise note to Microsoft: Please make Skype easier to manage!
Skype voice and video has tended to trigger IT security angst, and now that Microsoft has bought Skype, some observers are voicing hope that the service will be improved to help it be better managed in an enterprise setting. Read More


WEBCAST: Oracle

How Oracle Exalogic and Exadata Deliver Extreme Java
View this webcast to learn why Exalogic and Exadata are the definitive engineered platforms for enterprise application and database consolidation, with added advantage of extreme Java and database performance, unmatched reliability and scalability, and cloud-enabling elastic capacity. Register Today!

Interop: Cyberwar test runs yield information about defenses
Cyber warfare strategy is getting so sophisticated that network attacks suitable for major assaults are being used instead as trial runs meant solely to probe enemies with the aim of figuring out what their defenses are, an audience at an Interop security talk was told. Read More

Offshoring: Preparing for India's Proposed Privacy Rules
India's proposed data privacy regulations could create serious logistical problems for offshoring customers if passed. Offshore outsourcing attorneys and analysts explain how the data protection rules will impact customers. Read More

Facebook Combats Spam, Clickjacking With Four New Features
One day after Symantec uncovered an alleged privacy breach, Facebook released four new features to its security suite, unrelated to the discovery. Read More


WHITE PAPER: HP

Store 20 Times More Data on Disk
HP & Intel provide a comprehensive array of solutions across services, software, servers, storage, and networking. In addition, HP's services expertise can bring all your solutions together and deliver them any way you want. Read More Now!

Rambus buying Cryptography Research for $342.5 million
Rambus on Thursday said it has agreed to acquire security technology company Cryptography Research (CRI) for US$342.5 million in a cash and stock deal. The move could help the company address interest among chip makers to add security features on hardware. Read More

25 tech touchstones of the past 25 years
Read More

So you think you know networking?
Here's a brief quiz to test knowledge of some well known, some obscure networking terms and events. Read More

First Look: Cisco Identity Services Engine
Check out these screenshots from Cisco's new centralized policy controller for its enterprise switches and routers. Read More

Six Windows 7 Nightmares (and How to Fix Them)
Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

So you think you know networking?
Network World has been around now for 25 years, and in that time the technology it covers has changed dramatically. It's been quite a ride. Here's a brief quiz to test your knowledge of some of what's been happening over that time.

MOST-READ STORIES

  1. IT pro's perfect game puts him in Putt-Putt record book
  2. Google launches Chrome OS, says Windows is 'torturing users'
  3. Anonymous struggles with rift, PSN blame
  4. 6 best Android Honeycomb tablets you can buy now
  5. First look at Chrome OS
  6. Now you can download your very own E.coli bacterium
  7. Chrome OS: 10 things you can (and can't) do with the Google PC
  8. Hot products at Interop
  9. Is WiMax dead or thriving?
  10. John Chambers on the network

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment