Friday, June 15, 2012

Gartner: Network virtualization will lead to security control changes

10 Gadgets and Gifts for your favorite Geek Dad (or Grandpa) | What the LinkedIn breach teaches us about how to safeguard ourselves online

Network World Compliance

Forward this to a Friend >>>


Gartner: Network virtualization will lead to security control changes
Gartner analyst Neil MacDonald's specialty is security, and he not only keeps a close eye on what security vendors are doing, but he's an advocate for change as fundamental network technologies evolve. Virtualization is having an enormous impact, leading to questions about the role of physical security appliances in a virtual world. MacDonald predicts by 2015, 40% of security controls in the enterprise data center will be virtualized, up from 5% in 2010. In a recent interview with Network World, MacDonald talked about the future of security in the virtual world. Read More


RESOURCE COMPLIMENTS OF: BYOD & Mobile Device Management Tech Seminar

One Day Tech Seminar - BYOD & Mobile Device Management
Attend and learn how to implement the top five corporate policies and security tactics that organizations must adopt to ensure they can mitigate risk while empowering a mobile workforce. BYOD & Mobile Device Management Tech Seminar - 6/26 - Boston Click to continue

RESOURCE COMPLIMENTS OF: IT Roadmap Denver

Final Week to Register!
IT Roadmap only comes to Denver once a year so don't miss this opportunity to join hundreds of local colleagues who will gain a year's worth of enterprise-ready ideas, answers, best practices, and key contacts all in one day – in one place. Attend Free. IT Roadmap Denver – 6/20 - Colorado Convention Center.

10 Gadgets and Gifts for your favorite Geek Dad (or Grandpa)
A Father's Day shopping guide for Star Wars fans, car guys and gamers. Read More

What the LinkedIn breach teaches us about how to safeguard ourselves online
The mammoth security breach that exposed in the neighborhood of 6.5 million LinkedIn user passwords should be a wakeup call for end-users everywhere. We should all practice due dilligence and ask the companies we deal with questions about how they deal with security. Read More

Cerf: Secret wartime projects drove 'incredible' advances
The Enigma cypher machine used by the German military in World War II is still a tough nut to crack today. The total number of ways it can be configured for every letter is around 150 million million million. That's enough to keep it beyond the reach of all but the most determined of brute force attacks. Read More

10 tech giants lead Internet land grab
Google, Amazon spend millions to bet on names like BUY, GAME and SHOP Read More


WHITE PAPER: Limelight

Limelight Accelerate
Your users won't wait. Reward them with fast interactions, personalized experiences, and dynamic web pages that load in real time. Limelight Accelerate combines browser-based acceleration with a robust network platform to maximize Time to Action—the time it takes for visitors to engage with the content on your site—even on mobile devices. Learn More!

Experts dispute sandboxing would have stopped Flame
Bigger lesson learned from Flame: Multiple layers of security needed, so when one technology fails, a second or third may succeed Read More

INSIDER
6 secrets to a successful 802.1X rollout
Implementing and supporting 802.1X authentication on your network can be a challenge, but here are some tips that can help save you some time, money, and frustration. Read More

Facebook, Twitter, Google, AOL join new alliance to fight 'bad ads'
Facebook, Google, Twitter, and AOL have joined an alliance that has been set up to counter "bad ads," including those that deliver malware, direct users to scams, or try to sell counterfeit goods, said StopBadware, the promoters of the alliance. Read More

How Charles Dickens helped crack your LinkedIn password
Kevin Young, a computer security expert who studies passwords, is nearly at a loss for words. Literally. Read More


WHITE PAPER: Oracle

BI Optimization: Building a Better Business Case for BI
This white paper describes how to build a better business case for BI, by understanding the level of ambition organizations can have and the layers in the business case that should contribute to that level of ambition. Read Now

Alleged Lulzsec member, Ryan Cleary, indicted in U.S.
A U.S. federal grand jury has indicted Ryan Cleary, a British citizen, accusing him of orchestrating a hacking rampage last year that victimized Sony Pictures Entertainment, Fox Entertainment Group and others. Read More

How the U.S Can Avoid a 'Cyber Cold War'
As U.S. diplomats seek to elevate issues such as Internet freedom and cybersecurity in their talks with foreign counterparts, they have a tough balance to strike. Read More

Internet Explorer Flaw Triggers Google Nation-State Attack Message
A security flaw in Internet Explorer is triggering messages in some users' Gmail accounts that they may be the target of an attack from a nation-state. Read More

Global Payments says data breach investigation turned up a second breach
Global Payments, the electronic transaction-processing firm which acknowledged a data breach in April related to a suspected 1.5 million payment card numbers, yesterday said its ongoing investigation into that is turning up another issue: "potential unauthorized access to servers containing personal information collected from a subset of merchant applicants." Read More

10 Geeky Ties for Father's Day
Read More



SLIDESHOWS

First Look: Apple's "beautiful" new MacBook lineup
Apple rolled out major upgrades for both of its main notebooks today at WWDC. Here's a quick look at the new MacBook Pro and MacBook Air.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Cisco ends the SDN suspense
  2. Verizon Wireless' botched Shared Everything launch could sink carrier
  3. 8 questions that will dominate enterprise cloud adoption
  4. Microsoft scrambles as it patches 26 bugs, warns users of active attacks
  5. Gmail engineer: Women must overcome the imposter syndrome
  6. Snopes.com debunks old C++ 'interview' hoax
  7. Steve Jobs' LSD habit, why he indulged in marijuana, and his 1975 arrest
  8. Chambers: We should have killed Cisco Cius earlier
  9. Microsoft tries to promote Windows 8 without hurting Windows 7 sales
  10. Dell looks to cut $2 billion in costs over next three years

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: