Monday, August 03, 2009

Nine things about botnets that will scare your pants off

Pervasive encryption and key management; Cloud-based identity services taking on a different look as they grow
Network World logo

IT Best Practices

NetworkWorld.com | Update Your Profile


Sponsored by BMC Software
rule

Five Steps to Consolidating your Data Center
Datacenter consolidation can lead to dramatic cost savings, but it has to be done right. Learn the five steps to successfully consolidate and right-size your datacenter. One company eliminated more than 2,000 servers and is saving about $10 million in datacenter costs annually. How much can you save?

rule

Spotlight Story
Nine things about botnets that will scare your pants off

If you (like me) have been under the impression that botnets are no big deal, it's time to realize what a big threat they are to legitimate businesses and organizations. Corporate PCs that are turned into zombies can be forced to distribute spam, steal identity credentials and intellectual property, log keystrokes, commit click fraud and so much more. Here are nine things you might not know about botnets that are guaranteed to make you nervous. Read full story

Related News:

Pervasive encryption and key management
At ESG, we have this concept called "Pervasive Encryption." Since we don't have the reach of Forrester, Gartner, or IDC, you've probably never heard of it, but it goes something like this.

Cloud-based identity services taking on a different look as they grow
Cloud-based identity services are starting to gain a foothold among corporate users, but the evolving architecture looks nothing like the platforms companies have been building internally, according to Bob Blakley, vice president and research director at the Burton Group.

Recession no reason to neglect IT workforce, Gartner says
Gartner survey shows companies continue to put hiring and staff development on hold, despite specific skills being in demand.

Fixed Wireless vs. Wire: And the Winner is...
We recently did a study of the cost-effectiveness of wide-area ("outdoor") wireless access vs. wire.

Go Virtual or Go Cloud?
The decision between virtualization and cloud computing should be made on a case-by-case basis. Here are the pros and cons.

Sharing IT Resources and Risk
Two IT cooperatives, both founded in the 1960s, continue to share systems, cost and risk while offering the latest technologies for their members, from software as a service to open source.

Coping with IT pressure: Try doing less with less
How much more can IT do with less before IT breaks? That's the question the current recession poses, as it comes on top of other strong pressures on tech staffers, such as dealing with global teams that extend working hours significantly, competition from lower-cost coworkers and contractors overseas, and emerging competition from the cloud.

Data centers go underground
For Continental and Marriott, abandoned mines and military bunkers offer a subterranean safe haven from hurricanes and other threats. But will more enterprises follow?

FAQ: Data shows overseas shift for U.S. IT jobs
U.S. IT providers continue to push jobs offshore, while Indian firms work to refine the amount of work they complete overseas. Here's a look at where IT jobs are going and what's being done to fight that trend.

Twitter Lawsuit, What Should Business Learn?
Horizon Group Management has probably by now figured out that suing a tenant over an uncomplimentary tweet was probably not the best course. If the company had been worried that a tweet about a supposedly moldy apartment would damage its reputation, it has certainly magnified that effect probably millions of times.

The Hidden Cost of Out-of-Cycle Security Patches
This week we all had to deal with the emergency Microsoft security patches due to a critical exposure in the Active Template Library (templates used for COM+ development) that could result in local code execution by a hacker.

iPhone Support by Enterprise IT Groups Grows
So what mobile device should CIOs support? BlackBerry? Windows Mobile? iPhone? A new study from Forrester Research suggests that CIOs will eventually support all of them.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Black Hat's best
Black HatHow well you remember the Black Hat conference's most notorious incidents?

Wireless burning questions
IT quizHow much longer are you going to hang onto that Ethernet cable? And other questions.

Systems Management Success In Healthcare
Register today to hear how Steve Coryell, Network administrator at Island Hospital leveraged a breakthrough appliance-based approach to systems management to save his team precious time and his organization money.
Learn more now.


 

August 03, 2009

TOP STORIES | MOST DUGG STORIES

  1. iPhone SMS attack to be unleashed at Black Hat
  2. Mystery solved: MS emergency patch precedes Black Hat session
  3. Clampi Trojan plunders financials for botnet
  4. CERT and ISC warn about BIND9 DNS vulnerability
  5. 5 technologies Iran is using to censor the Web
  6. Microsoft-Yahoo will change cloud computing
  7. Cloud computing confusion reigns in U.S. government
  8. Black Hat's most notorious incidents
  9. What business is Cisco in today?
  10. Cisco fixes critical WLAN flaws

The necessary convergence of IT and Facilities
If IT and Facilities could work collaboratively, organizations can operate more efficiently and effectively while still meeting their business objectives. That's why Eaton® is partnering with organizations that develop IT management systems to create an integrated approach to energy management.
The necessary convergence of IT and Facilities



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment