Friday, October 07, 2011

Survey shows shift to cloud-based services, despite concerns

The future of malware | Feds want uber cybersecurity compliance standard

Network World Compliance

Forward this to a Friend >>>


Survey shows shift to cloud-based services, despite concerns
A survey of 5,300 IT and security managers in 38 countries about cloud computing offers a vivid snapshot of expectations, anxieties and sometimes shattered hopes. Read More


WHITE PAPER: Intel

Raise QoS in vSphere*4 with Dell & Intel
The industry transition to 10 Gigabit Ethernet (10GbE) is creating new quality of service (QoS) challenges. This paper examines best practices for analyzing, monitoring and controlling bandwidth in VMware vSphere 4.1 environments when using Dell servers and Intel Ethernet 10 Gigabit server adapters. Click to continue

WHITE PAPER: Oracle

Database Consolidation onto Private Clouds
Consolidation can be achieved through server, operating system, and database consolidation, and the higher the consolidation density achieved, the greater the return on investment (ROI). This white paper describes how to successfully consolidate your database onto a private cloud through several deployment models. Read More Now!

The future of malware
Watch out for whaling, smartphone worms, social media scams, not to mention attacks targeting your car and house Read More

Feds want uber cybersecurity compliance standard
Tired of regulators from three or four federal agencies auditing your network security compliance every year? A congressional task force recommends a super-standard that would cut the number of annual audits back to just one. Read More

Ten Security Essentials for the Networked Enterprise
The ideal information security environment is different depending on who you talk to. Your typical security engineer may say it must have firewalls, intrusion detection or any number of security focused technologies. Meanwhile a security tester may suggest that it is conducting penetration testing to provide assurances that security widgets are working well. Read More

Mobile security threats are heating up
Criminals, security researchers, vendors and even investors are now taking mobile security more seriously. Read More


WHITE PAPER: VeriSign

Best Practices for a Rapidly Changing Threat Landscape
This paper describes how Verisign draws on their success and hands-on engagements with customers in a range of industries to identify a set of best practices that enables organizations to keep pace with DDoS attacks while minimizing impact on business operations. Read Now!

Facebook Privacy: 11 Settings to Revisit Now
With Facebook's constant stream of changes, keeping up with your privacy settings can be daunting. Here's a rundown of the newest features, what the changes mean to your privacy and how to update your settings. Read More

SpyEye steals banking codes by sending them to wrong phone
Researchers from browser security vendor Trusteer have identified a new variant of the SpyEye financial Trojan that tricks online banking users into changing the phone numbers associated with their accounts. Read More

Android malware downloads instructions from blog
Researchers from Trend Micro have spotted a piece of malicious software for Android that receives instructions from an encrypted blog, a new method of communication for mobile malware, according to the company. Read More

Android's big security flaw, and why only Google can fix it
Device makers and carriers let patches languish, so users may not ever get them -- a new approach is sorely needed Read More


WHITE PAPER: Citrix

Scale the Data Tier: NetScaler Intelligent Load Balancing
Citrix® NetScaler® SQL Intelligent Load Balancing is an intelligent SQL proxy that offloads database servers, routes SQL requests to the best server and enforces and logs user access. The result: better scalability, availability and security in the data tier. Download this free Citrix white paper. Read now

Microsoft slates IE bug fix for next week
Microsoft today said it will ship eight security updates next week to patch 23 vulnerabilities in Windows, Internet Explorer (IE) and several other products in its portfolio. Read More

Amazon adds free encryption to storage service
Using Amazon Web Services' new Server Side Encryption feature, enterprises will at no extra cost be able to encrypt data stored on the company's Simple Storage Service (S3), Amazon said on Tuesday. Read More

NSS Labs offers reward money for fresh exploits
NSS Labs is sweetening the pot for its ExploitHub marketplace by offering rewards to security gurus who can write working exploits for a dozen "high-value" vulnerabilities. Read More

Check Point software takes aim at botnets
Check Point Software is coming out with technology designed specifically to fight bots by discovering infections, finding command and control servers and cutting off communications with them. Read More



SLIDESHOWS

26 helpful open source network management tools
Over the last decade or so, open source development has skyrocketed, and network management software has ridden that wave. Many frustrated IT administrators have turned to free tools to monitor, configure and map their networked devices. Here are 26 examples of open source network management software tools to help you do your job.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Steve Jobs narrates "Crazy ones" think different ad in never aired clip
  2. Apple Chairman Steve Jobs dead at 56
  3. Steve Jobs at Apple: In pictures
  4. Steve Jobs dies
  5. Huawei gunning for Cisco in the enterprise
  6. Steve Jobs: A timeline
  7. Can Hotmail revamp win back GMail defectors?
  8. Steve Jobs gave Barack Obama an iPad 2 "a little bit early"
  9. Steve Jobs and life in the shadow of death
  10. TechAmerica: U.S. IT industry adds jobs in 2011

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: