Friday, November 30, 2012

Cisco’s internal security team fights to corral BYOD, malware and Wild West environment

  Products of the week 11.26.12 | PGP Corp. co-founder's startup targets cloud authentication
 
  Network World Compliance

Forward this to a Friend >>>


Cisco's internal security team fights to corral BYOD, malware and Wild West environment
Many organizations have a computer security incident response team (CSIRT) that swoops into action to battle malware outbreaks, other types of cyberattacks and possible insider threats, and at networking giant Cisco, that CSIRT team is made up of about 60 people trying to protect a business with about 75,000 employees. Read More


WHITE PAPER: Brocade

Scaling Out Data Centers
Organizations of all sizes are facing daunting challenges as they struggle to adapt their data center networks to new technologies and applications. The move toward cloud architectures in particular is demanding a high-performance network interconnect that can host servers potentially numbering in the thousands. Read Now

RESOURCE COMPLIMENTS OF: LogMeIn

LogMeIn Central: Automate, Monitor and Manage PCs.
LogMeIn lets you Monitor and Manage PCs, deliver patches and updates to multiple PCS simultaneously. Central helps IT deliver seamless support that keeps employees productive and up and running. LogMeIn Central - automate routine tasks and do more. Free Trial

Products of the week 11.26.12
Our roundup of intriguing new products from companies such as HP and Blue Coat Read More

PGP Corp. co-founder's startup targets cloud authentication
When Phil Dunkelberger co-founded PGP Corp. in 2002 with Jon Callas, it was to acquire the codebase for the famous encryption technology known as "Pretty Good Privacy" which had been sold to Networks Associates in 1997. That proved a good move for public-key encryption, and now Dunkelberger says his next project -- the formation of a company called Nok Nok Labs -- involves a revolutionary way to support authentication in corporate networks and the cloud. Read More

INSIDER
BYOD: Where the costs are
Few technology trends have inspired as many misgivings -- and as much misinformation - as BYOD, or "bring your own device." Is the idea of allowing employees to purchase and use their own laptops and mobile devices a security nightmare? A productivity boon? A drain on the service desk? And perhaps the biggest question of all, a cost-savings nirvana? Read More


WEBCAST: Fluke Networks

Solve QoS Problems in VoIP Call Centers
View this short video "Maintaining High VoIP Quality for Call/Contact Centers with Network Time Machine", to learn more about how carrier and call center customers are using Network Time Machine to rapidly determine problem domain and identify choke points in the network. View Now!

'Spear phishing' the main email attachment threat
Some 91 percent of cyber attacks begin with a "spear phishing" email, according to research from security software firm Trend Micro. Read More

Damage from attack on power grid would surpass Sandy
The U.S. is in urgent need of a nationwide strategy to protect its highly vulnerable electric grid from succumbing to a cyberattack that could cause far more damage than Hurricane Sandy, a recent report said. Read More

Internet Explorer 10's 'do not track' risks upsetting users, finds poll
Microsoft's decision to turn on Internet Explorer 10's 'do not track' setting by default could turn some consumers against the browser if it interferes with features such as password retention and autofill, a new survey has concluded. Read More


WHITE PAPER: Capella University MP

Explore Capella University IT/MBA Programs
As an accredited university, Capella University offers online graduate degrees in business, education, human services, information technology, psychology, public health, and public safety and undergraduate degrees in business, information technology, and public safety. Learn More.

Latest Java zero-day exploit renews calls to disable it
A zero-day Java exploit found for sale in the criminal underground has renewed calls to disable the cross-platform runtime environment in Web browsers. Read More

Construction company, bank, settle dispute over $345,000 cyber heist
A Maine construction company that sued its bank after losing $345,000 in an online banking heist settled its dispute after a protracted legal battle that raised questions about a bank's responsibility in protecting customer accounts against cyber fraud. Read More

10 tips for implementing IPS securely
An intrusion prevention system (IPS) includes all the features of an intrusion detection system but also has the ability to act upon malicious traffic. Since the IPS usually sits in line with network traffic it can shut down attacks, typically by blocking access from the attacker or blocking access to the target. In some cases, the IPS can talk to the firewall to block an attack. Read More

INSIDER
Tech job market on the upswing
To see the state of the job market for tech workers, just look at the headlines over the past few months: Read More

10 hard truths IT must learn to accept
Unsanctioned devices, compromised networks, downtime -- today's IT is all about embracing imperfections Read More

 
 
 

SLIDESHOWS

Cool Yule Apps
13 new things to put onto your iPad or tablet.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. GOP Congressman's attempt to look cool on Reddit backfires
  2. 10 hard truths IT must learn to accept
  3. 14 of the most useful Linux websites
  4. Is Windows 8 really a sitting duck for malware?
  5. Latest Java zero-day exploit renews calls to disable it
  6. 2013 IT salaries: 15 titles getting the biggest pay raises
  7. Alcatel-Lucent to take on Cisco, VMware in crowding SDN field
  8. Android Jelly Bean resurrected my HP Touchpad
  9. Talking about Linux online: There are, in fact, stupid questions
  10. Mobile browser vulnerability lets hackers steal cloud computing time
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment