Thursday, March 01, 2012

Alleged RSA crypto flaw hotly debated

  FTC: Identity theft still top consumer blight | MWC2012: Convenience, security helping NFC growth
 
  Network World Network Architecture

Forward this to a Friend >>>


Alleged RSA crypto flaw hotly debated
Is the RSA cryptosystem flawed or is the recent sharp criticism of it the result of poor — or even malicious — implementation of key-generation techniques that appear to have rendered some RSA-based encryption keys crackable? Read More


WHITE PAPER: Citrix Systems

Best Practices for Implementing 2048-bit SSL
Ready for 2048-bit SSL? Not with F5. Shift to Citrix NetScaler. 2x faster 2048-bit SSL performance. Download the Citrix and Verisign 2048-bit Performance Kit. Learn More

WHITE PAPER: APC

Benefits and Risks of Energy-saving Modes of UPS Operation
This paper shows that eco-mode typically provides a reduction of 2-4% in data center energy consumption and explains the various limitations and concerns that arise from eco-mode use. Situations where these operating modes are recommended and contraindicated are also described. Learn More

FTC: Identity theft still top consumer blight
The Federal Trade Commission has released its annual list of top consumer complaints and for the fourth year in a row identity theft leads the pack. Read More

MWC2012: Convenience, security helping NFC growth
Near field communication chip maker NXP showed off what's possible with the technology at its booth at Mobile World Congress in Barcelona. Read More

The security risks and rewards of big data
Big data does not automatically mean big security improvements. If not handled with care and expertise, it could mean the opposite. That will be the focus of a panel discussion at the RSA Conference in San Francisco today at 3:50 p.m. in room 301. Read More

Miami Dolphins dive into cloud analytics
The Miami Dolphins teamed with IBM to deploy a cloud-based analytics system that helps stadium staff to be proactive about potentially disruptive events, such as parking bottlenecks, concession stand inventory shortages, and inclement weather. Read More


WHITE PAPER: APC

Fundamental Principles of Network Security
This paper covers the fundamentals of secure networking systems, including firewalls, network topology and secure protocols. Best practices are also given that introduce the reader to some of the more critical aspects of securing a network. Learn More!

Cisco takes first step in delivering on SecureX vision
A year Cisco put forward its vision called SecureX about how it would devise ways that its network products, first its firewalls, would be able to capture information related to user devices, especially tablets and smartphones, to exert context-based security control. Today, Cisco took the first step to deliver on that vision while acknowledging more needs to be done. Read More

12 seriously cool "toys" for big boys and girls
Big Boys Toys exhibition tempts your inner child Read More

Intel lays out strategic mobile roadmap
Intel used to talk endlessly about Moore's Law -- doubling the transistors that can be put on an integrated circuit about every two years -- as the source of ever-greater benefits for everyone in the PC value chain every two years like clockwork. But today, fittingly at Mobile World Congress, Intel CEO Paul Otellini in effect declared that the company could no longer wait on Moore's Law. Read More

Rapidly evolving low-cost mobile technology keeps the military up at night
Are smartphones and other devices the scourge of cyber security warriors worldwide? Read More


WHITE PAPER: Raritan

Data Center Transformations
This paper discusses ways to simplify data center transformation and introduces a new process – BOCA – Build Outs, Consolidations and Acquisitions. Learn the five stages of BOCA and see how the right remote access and IT infrastructure management tools, deployed early and continuously monitored, can dramatically improve overall efficiency. Read now!

Cisco updates security certs
Cisco this week updated its CCNA and CCNP Security certifications to keep certificates up-to-date on new security products and best practices. Read More

Inadequate SSL Certificate Data Threatens IT Security
SSL certificates are a fundamental component of secure online transactions, but a new survey finds that a majority of organizations don't know where or how many certificates they actually have, and nearly as many lack an accurate idea of which certificates are about to expire. Venafi CEO Jeff Hudson says this increases organizations' operational, security and audit and compliance risk. Read More

IBM touts quantum computing breakthrough
IBM researchers have established three new records for reducing the error rates in elementary computations and retaining the integrity of quantum mechanical properties in quantum bits (qubits). Read More

National Security Agency defines smartphone strategy: Think Android (maybe)
America's intelligence agency, the National Security Agency (NSA), today disclosed how it's going to handle mobile security. Read More

Carrier Ethernet 2.0 aims for global connectivity
The Metro Ethernet Forum has updated its Carrier Ethernet specification, hoping to standardize the use of Ethernet for global multicarrier services. Read More

Microsoft flashes cool future tech
Microsoft's 3D displays, augmented-reality mirror are among its lab technologies shown at its TechForum Read More

 
 
 

SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. How to protect your privacy on Google
  2. 25 alleged Anonymous members busted by Interpol
  3. Windows Phone smokes its competition at MWC ... sort of
  4. Cisco bounces back
  5. Mobile World Congress 2012: This year's hottest gadgets
  6. 6 things you need to know about Google's new privacy policy
  7. IBM scientists discuss quantum computing breakthrough
  8. Tech debate: The future of end user computing
  9. Steve Jobs ignored Warren Buffet's advice for a stock buyback
  10. Windows 8 most burning questions
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_architecture_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: