Friday, June 24, 2011

Vulnerability analysis tools add compliance features

DNS agility leads to botnet detection | Net neutrality goes Dutch

Network World Compliance

Forward this to a Friend >>>


Vulnerability analysis tools add compliance features
Compliance is a natural extension of a vulnerability analysis tool. Normal vulnerability scanning includes searching for unpatched systems, unprotected directories, and other errors in configuration. Read More


WHITE PAPER: Enterasys Networks

Enabling anIncreasingly Sophisticated Customer Base
Stephens Support Services provides the IT infrastructure and support for Stephens' brokerage, holding company and hospitality businesses. Stephens Support Services is a separate organization that partners with each business, solving unique challenges and positively impacting the bottom-line through technology. Read now!

WHITE PAPER: Extreme Networks

Networks in Motion
Download this whitepaper today and discover how you can cost-effectively optimize your network for the mobile demands of today's business. Examine how IT can provide: * Personalization and intelligence. * Ease of operation. * Seamless quality of user experience. * Secure on-the-go access to public and private networks. Read now!

DNS agility leads to botnet detection
Research out of the Georgia Institute of Technology can detect when bot masters reserve domains to set up command-and-control networks. Read More

Net neutrality goes Dutch
While the Netherlands is primarily known for windmills, tulips and legalized marijuana, it could soon be known for its net neutrality regulations as well. Read More

A new security architecture for the cloud
The Open Group's Security for the Cloud and SOA Project publishes "An Architectural View of Security for Cloud." Read More


WHITE PAPER: EMC

The Mandate for Converged Infrastructure Management
Converged infrastructure is changing the way data centers roll out infrastructure resources and providing a clear and achievable path to cloud computing environments. Effective management of infrastructure is a key capability that can significantly impact the degree of success for data centers going the converged route. Read more

Lockdown: How would you handle emergency network operations?
Are you ready for a natural disaster, denial of service or security breach? If one happened right now, would you have a plan ready to respond to it? What the recent highly publicized security breaches demonstrated was that some companies were ready and some were woefully unprepared. Part of that has to do with technology and security controls, but most of it is about planning and process, not tools. So what does it take to be ready for an attack? Read More

Mesh networks may make SQL injection attacks more persistent
Mass web compromises have typically redirected visitors to a handful of central malware sites, but a peer-to-peer approach will make mass attack more pernicious. Read More

EU to Web companies: "Sort out privacy by 2012, or else!"
The European Commissioner for the Digital Agenda has told web companies to come up with a do-not-track standard by mid-2012, or the Commission will have to impose new rules. Read More


WHITE PAPER: Palo Alto Networks

Next-Generation Firewall for Dummies eBook
This book provides an in-depth overview of next-generation firewalls. It examines the evolution of network security, the rise of Enterprise 2.0 applications and their associated threats, the shortcomings of traditional firewalls, and the advanced capabilities found in next-generation firewalls. Read now!

New bill would require mobile carriers to detail 4G speeds
A new bill in the U.S. House of Representatives would require mobile providers to detail minimum data speeds and give other information to customers. Read More

Cerf: Streaming network crunch could be eliminated
With sufficient bandwidth, video streaming would be rendered unnecessary, Vint Cerf says Read More

Ready or not, they're already in your enterprise
Organizations are being overrun by users bringing their own devices to work. The paradox is that organizations trying hardest to ban workers from using their devices may be increasing their risk rather than mitigating it. Read More

Securing mobile devices requires enterprise and service provider controls
Enterprises are adept at securing and managing computing endpoints such as desktop and laptop computers, but most do not have the same controls and processes in place for what is likely the fastest-growing computing platform: smartphones and other smart mobile devices. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

The 7 worst tech merger ideas ever
In this slideshow, we'll take a look at seven proposed mergers that we hope will never see the light of day, as their consummation would likely mean the end of the entire tech industry and possibly even the entire world.

MOST-READ STORIES

  1. Why I dumped my 4G Android for an iPhone
  2. CFOs lack faith in CIOs and IT teams, survey shows
  3. Project PM leaks dirt on Romas/COIN
  4. Microsoft confirms BPOS cloud outage
  5. LulzSec members to be outed by Netherlands hacking group
  6. 12 ways the cloud changes everything
  7. Essential gadgets for the road warriors
  8. Company claims it can disregard GPL requirements
  9. iPhone 5 rumor roundup for the week ending June 10
  10. A Cisco engineer says changes at Cisco are good

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: