Wednesday, October 12, 2011

The SSL certificate industry can and should be replaced

Computer infected? Blame yourself, Microsoft report concludes | 4 valuable additions to your cloud security toolkit

Network World Daily News AM

Forward this to a Friend >>>


The SSL certificate industry can and should be replaced
The SSL certificate authorities like Comodo that have had their security undermined by hackers shouldn't be trusted, and in fact, the way the entire SSL certificate industry of today works can and should be replaced with something better, says Moxie Marlinspike, a security expert who's come up with a plan he says will do that. Read More


RESOURCE COMPLIMENTS OF: IT Roadmap 2011

IT Roadmap Washington, DC - 12/7/11 Register Now!
IT Roadmap is the one day, cost free, professional-level conference and expo that's full of job-ready solutions you can put to work now. IT Roadmap surrounds you with technology's most-followed analysts and the industry's most-innovative solution providers, all focused entirely on building the roadmap you need in crucial areas of enterprise IT. Click to continue

RESOURCE COMPLIMENTS OF: Zyrion

CIOs demand visibility to IT service performance
Cloud, Virtualization, Mobility, Unified Computing and more, are all creating new, complex IT management challenges. Organizations want integrated service-centric monitoring solutions for service impact visibility and SLA compliance, executive dashboards, datacenter manager operational reporting, and service problem analysis. Read More.

Computer infected? Blame yourself, Microsoft report concludes
Zero-day exploits are nerve-racking for IT professionals but are far less dangerous than unpatched older vulnerabilities for which fixes are available, Microsoft says. Read More

4 valuable additions to your cloud security toolkit
If you ask IT execs why they're hesitant about moving to the public cloud, security comes up at the top of the list. But security vendors are responding to these concerns with a raft of new products. Here are four interesting cloud security tools that we tested. Read More

Microsoft launches Firefox, Chrome attack campaign
In what has become a classic Microsoft-ism, the folks in Redmond on Tuesday launched a website to convince the world that Internet Explorer is the only true safe browser, at least in comparison to Chrome and Firefox. Read More


RESOURCE COMPLIMENTS OF: WildPackets

See the Entire Network: Past & Present
SNMP. Flow-based network statistics. Both deliver incomplete views of what's in your network. Introducing WatchPoint - a network monitoring for analysis solution that shows real-time problems and tells you why there's a problem. Download your free kit to learn how to create one view to rule them all. No wizardry required. Click to continue

Five generic domain names and their journey through time
Remember the go-go days of the 1990s, when dot-com domain names based on ordinary nouns and verbs were snapped up by hopeful companies? Here's a look at five very generic domain names, and where they've been. Read More

Do Nearly Half of Americans Really Want a Windows Tablet?
The iPad is the runaway success story of the tablet market. So why did a recent survey found almost half of people polled want a Windows-based tablet? It could be there is a desire for a real alternative. Read More

Huawei asks U.S. to explain its exclusion from emergency network project
China's Huawei Technologies has called on the U.S. Department of Commerce to explain why the company is apparently being excluded from participation in the construction of a national wireless network for emergency responders. Read More


WHITE PAPER: CA Technologies

Sainsbury's Safeguards Supply Chain for over 800 Stores
Sainsbury operates the second largest online food retailer in the U.K. See their approach to gain better visibility to 1,800 devices and ensure high-availability of its network to safeguard the supply chain for over 800 stores and 100,000 online shoppers per week. Read now

Cisco preps virtual desktops for video
Cisco this week filled out its desktop virtualization product line by adding a thin client that improves processing and bandwidth utilization for voice and video. Read More

Patch Tuesday: IE bug could spread virus; .Net affects Mac users
There were no big surprises in this month's Patch Tuesday. Microsoft issued eight updates, two critical, to fix 23 vulnerabilities. However the two critical patches are doozies. One of them fixes all versions of Internet Explorer on all versions of Windows and the other fixes .Net/Silverlight. Read More

Is Cisco losing thought leadership in the networking industry?
If you work in networking, you've gotta have love for Cisco. Like most of us, I first learned about networking through Cisco, and attaining the CCIE certification would prove to be the basis for launching my career. Read More

Cellphones will become a way to attack otherwise protected devices: report
Mobile phones will become an increasing menace to network security that could drop malware onto protected devices when they dock to sync or plug into USB ports to charge, security experts say in a Georgia Tech report. Read More

Don't get carried away by Hadoop's 'gee whiz' factor
Companies should take a pragmatic approach to implementing Hadoop for their "big data" requirements, a new report released Tuesday by analyst firm Forrester Research urges. Read More



SLIDESHOWS

26 helpful open source network management tools
Over the last decade or so, open source development has skyrocketed, and network management software has ridden that wave. Many frustrated IT administrators have turned to free tools to monitor, configure and map their networked devices. Here are 26 examples of open source network management software tools to help you do your job.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. 5 cloud security companies to watch
  2. Sam Ramji: Cloud makes open source 'inevitable' for Microsoft
  3. iPhone 5 rumor roll-up (continued) for week ending Oct. 7
  4. Cops: 'Eureka, I found it' on cell phone with no warrant required
  5. Watch large hadron collider collisions with an Android app
  6. Beware of the iCloud
  7. Fedora 17 recognized as beefy miracle
  8. Huawei gunning for Cisco in the enterprise
  9. Google launches Dart as a JavaScript killer
  10. 8 ways to become a cloud security expert

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment