Friday, September 20, 2013

Four ways to defend against DDoS attacks

5 ways devops can benefit IT | 2013 Ig Nobel Prize winners: from opera-loving mice to stargazing dung beetles

Network World Compliance

Forward this to a Friend >>>


Four ways to defend against DDoS attacks
Given that Distributed Denial of Service (DDoS) attacks are becoming more frequent, it is a good time to review the basics and how you can fight back. Read More


WHITE PAPER: CDNetworks

Scaling the Great Firewall of China
This white paper and FAQ provide a high level understanding of challenges to reaching China with your brand and the types of licenses needed to operate a website reaching consumers, businesses, and employees in China. Read now >>

In this Issue


WHITE PAPER: CDNetworks

Dynamic Web Acceleration
Delivering web applications over the Internet and ensuring reasonable response times for users around the globe is a significant challenge. Find out how Dynamic Web Acceleration can accelerate highly dynamic and interactive web applications aimed at a global audience. Learn more.

INSIDER
5 ways devops can benefit IT
Devops is about getting the people responsible for creating applications to work more closely with the people who maintain apps in production. The goal? Faster delivery, better quality apps. Read More

2013 Ig Nobel Prize winners: from opera-loving mice to stargazing dung beetles
Improbable research efforts honored with Ig Nobel Prizes Read More

70 percent of business users vulnerable to latest Internet Explorer Zero-Day
Microsoft alert says all supported versions of Internet Explorer contain a zero day vulnerability that is being actively targeted online, and 70 percent of Windows business users are impacted Read More

Apple's iPhone 5S reopens debate on sensor data collection
While data collected from sensors can be useful to hackers, it can also help defend against them by alerting companies to unusual behavior Read More

Poor design fosters hacker attacks of websites running PHP
App language contains open door for Black Hat mischief Read More


WHITE PAPER: Brocade Communications

SDN: The next wave of networking innovation
Brocade and IDG bring you this exclusive eBook exploring the impact of today's IT and Data Center challenges on your network. With a focus on software-defined networks, use this eBook to start your evolution toward a flatter, less complex and more agile network architecture—an architecture ready for the future. View Brocade's eBook on SDN

Snowden's role provided 'perfect cover' for NSA data theft
Fugitive document leaker Edward Snowden's role as a systems administrator provided easy access to classified NSA documents sitting in a file-sharing location on the spy agency's intranet portal. Read More

10 programming languages to make a developer pull his or her hair out
When developers discuss the programming languages they hate the most, these names tend to come up - a lot Read More

Vampire mice and zombie hard drives: USB dangers lurk in Linux
NEW ORLEANS - Linux kernel developer Sarah Sharp is searching for a solution to the problem posed by vampire mice, she said in a presentation at LinuxCon North America Wednesday afternoon. Read More

Hacking courses offer cybercrooks tips on how to hone skills
A growing number of experienced hackers have begun offering structured hacking courses for crooks seeking to make a career in cybercrime. Read More

Energy Department spends $30M to bolster utility cybersecurity tools
The Department of Energy today awarded $30 million to a 11 security vendors to develop technology the agency says will better protect nation's electric grid, oil and gas infrastructure from cyber-attack. Read More


WEBCAST: HP

HP Webcast: Mobile Application Development
Join John Jeremiah, Sr. Product Marketing Manager, HP and John Jackson, Research Vice President, Mobile & Connected Platforms, IDC for an interactive discussion on the results of the HP Mobile Application Development Maturity Peer Assessment Tool. Date: September 18 @ 1:00pm EDT Register Now

NSA wants even closer partnership with tech industry
The National Security Agency's director of information assurance today said the "way to achieve confidence in cyberspace" is to increase collaboration between the government and the high-tech industry — remarks that rang ironic given former NSA contractor Edward Snowden's revelations about how NSA works with industry. Read More

Versafe offers a server-side-only approach to fraud detection and prevention
Already a success in its native Israel, Versafe is bringing its TotALL Online Fraud Protection Suite to North America. With solutions for web-based and native mobile applications, Versafe protects banking (and other) applications from fraud and other attacks at the application layer, protecting users without requiring them to download software. Read More

HP rolls out next-gen firewall line, threat-detection service
HP today took the wraps off its Next-Generation Firewall line designed to exert application-level controls and visibility over all traffic related to the enterprise, including mobile devices used in public WiFi settings and traffic from cloud services. Read More

Zettaset working toward Big Data encryption for Hadoop
Zettaset, which makes management and security software for Hadoop, says it plans to add encryption capabilities by year end. Read More

How cloud-based disaster recovery is getting more efficient
Through advancements to back-end systems, providers of cloud-based disaster recovery as a service (DRaaS) are becoming more efficient at storing customer data and getting faster at restoring sites. Read More

16 IT Skills in High Demand in 2013
What IT skills are the hottest with employers and what forces are driving those career trends? We examined Foote Partners recently released quarterly IT Skills and Certifications Pay index and we spoke with industry experts to find out. Read More


SLIDESHOWS

The Android naming quiz

The upcoming version of Android is called KitKat, but how well do you know the earlier release names?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Today's iOS 7 downloads an unprecedented challenge for IT

2. Microsoft warns of IE zero day in the wild, all IE versions vulnerable

3. The 7 best new features in iOS 7

4. iPad 5 rumor rollup for the week ending Sept. 17

5. Apple iOS 7: Six key things to do before you tap 'Download'

6. Education networks see massive traffic spikes from iOS 7 update

7. KVM vendor creating open source hypervisor specifically for cloud workloads

8. Apple issues internal high priority alert in light of iOS 7 download issues

9. Apple's iOS 7 icons are ugly and a step backwards

10. Computer science major ranks No. 8 for salary potential


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment