Tuesday, December 11, 2007

Scary tech stories; AT&T expands reach of its 40G MPLS backbone; Your last line of defense

Daily News AM Alert Network World logo
NetworkWorld.com | LANs & WANs Research Center | Update Your Profile
Scary tech stories: How dangerous user behavior puts networks at risk

Denise Dubie By Denise Dubie
IT executives have always had to protect their networks from external attacks, but with data breaches increasing in frequency, more network and security managers are realizing negligent user actions could be the cause of many of their security nightmares. Read full story

Senior Editor Denise Dubie covers the technologies, products and services that address network, systems, application and IT service management for Network World. E-mail Denise.


SPONSORED BY CA
rule

Unifying management systems
Learn the benefits of unifying your network and voice management systems in this Special Brief. You will learn how marrying these platforms will reduce demands on your limited IT budget and staff. Learn more today.

rule
RELATED NEWS:

AT&T expands reach of its 40G MPLS backbone
AT&T announced Monday that it had expanded the reach of its 40G IP/MPLS backbone network to more than 50,000 miles in the United States.

NBA: Your last line of defense
There’s a new weapon in the security arsenal that monitors network traffic and issues real-time alerts when it spots unusual or suspicious behavior on the network.

Data breaches, regulations fueling data encryption adoption
Data encryption grows in government and business in reaction to data-breach fiascos, regulatory requirements.

Alcatel-Lucent unwraps Web Services security appliance
The OmniAccess 8550 Web Services Gateway acts as a secure proxy for application flow, inspecting packets to determine whether a user or ...

NSS Labs touts PCI certification program
Security product-testing firm NSS Labs has started a certification program based on requirements associated with the Payment Card Industry security standard.

Review: Who's got the fastest firewall?
When we tested firewall performance as part of in our UTM firewall test we focused on how well the products would push inspected packets along with other UTM features, specifically intrusion-prevention systems and antivirus, turned on. However, many enterprise managers will use these devices primarily just as firewalls, and might be curious how fast they’d operate without UTM slowing them down.

Denver airport goes fast and free on Wi-Fi
Denver International Airport is betting that travelers will like getting something for free, and so far it looks like a good bet.

NTT DoCoMo updates kid-friendly cell phone
NTT DoCoMo is launching a new cell phone for children that has a loud "panic" alarm and a location-tracker to help parents find their kids quickly if they get lost.

LIVE CHAT TODAY

Live Chat happening today: Microsoft/Cisco cert tips Need Microsoft/Cisco cert tips? Get your cert questions answered by cert guru Patrick Regan, author of over a dozen books. Today, Dec. 11, 2-3 p.m. EST. No registration required.

BLOGS

Today on Cisco Subnet
Top 6 Cisco acquisitions of 2007; what it should buy in 2008. U.S. Secret Service busts $5.7 million Cisco scam on eBay. Blogger Brad Reese mourns the passing of CompUSA. Juniper opening up its OS could negatively affect Cisco. CCIE Rus Healy continues sharing his experiences of taking his CCIE lab exam.

Up for grabs: 15 copies of CCIE Voice Exam Quick Reference Sheets
Enter to win one of 15 downloads of Cisco Press' CCIE Voice Exam Quick Reference Sheets by Mark Lewis. Check out Mark's blog for Cisco Subnet here and an excerpt of the book here. Last month competition winners here.

Today on Microsoft Subnet
Mind your corporate documents – Office Live Workspace went public Monday. Plus, Microsoft ads are coming to a phone near you. And, Microsoft Live Labs previews Volta -- a programming tool that converts monolithic .NET applications into distributed, browser friendly apps.

Can't keep a good iPhone locked down
Apple's strategy for maintaining carrier network control of iPhones is clear. Their response to iPhones that were unlocked from AT&T's cellular network was to turn the phones into bricks. Now the anySIM software that can be used to unlock iPhones has been open sourced. Anyone wishing to use, modify code and contribute back can help keep the iPhone "free" to run on other carrier's networks.

Today on Layer 8: We wonder if we don’t need some translation software for some of the stuff we read every day
Looking to create a system that quickly converts documents in foreign languages into English so that military personnel can react more rapidly to threats, DARPA today awarded BBN Technologies a $5.6 million contract to develop an automated translation system for handheld, laptop or desktop computers.


HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

'07 ENTERPRISE ALL-STARS
'07 ENTERPRISE ALL-STARS Honoring outstanding technology projects.

SPONSORED BY CA
rule

Unifying management systems
Learn the benefits of unifying your network and voice management systems in this Special Brief. You will learn how marrying these platforms will reduce demands on your limited IT budget and staff. Learn more today.

rule

Holiday Tech Toys
Stumped on what gadgets and gizmos to give this holiday? Have no fear, Cool Tools' Keith Shaw is here. We do all of the heavy lifting of wading through hundreds of submitted technology products to find the very best holiday gift ideas. Click here to view our holiday gift guide: http://www.nww.com/PSA2_1210

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

12/11/07

TODAY'S MOST-READ STORIES:

  1. Microsoft pulls plug on potty-mouth Santa
  2. Open source software targets math programs
  3. Network coding: networking's next revolution?
  4. Cyberattack on national labs
  5. The nine worst Microsoft products
  6. Former Microsoft employee charged
  7. 2007 Cool Yule Tools gift guide
  8. Nortel thrashes Cisco wireless market share
  9. Cisco warns of bug in desktop software
  10. Vista's IPv6 raises new security concerns


TOP 100 OF 2007


Comprehensive Network Access Control

Download an exclusive whitepaper on Comprehensive Network Access Control and discover how you can provide endpoint security, compliance and peace of mind. Get it now



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Daily News AM Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



1 comment: