Friday, June 13, 2014

10 'geek dads' share tales and tips from the IT trenches

Symantec rolls out threat-intelligence sharing with Cisco, Check Point, Palo Alto Networks | Cisco takes early lead in SDN thought leadership

Network World Compliance

Forward this to a Friend >>>


10 'geek dads' share tales and tips from the IT trenches
Tech pros weigh in on fatherhood, workhood and how they balance the two. (Hint: Make time for fishing trips.) Read More


WHITE PAPER: Network Instruments

4 Key Survival Tips for Planning Your Next Big Data Project
Big Data projects slam network performance. This paper offer survival tips to prepare your network before the Big Data projects hit, not after. Learn how to monitor and manage network performance for bandwidth, consistent low latency, scalable storage, processing power and security. Learn More

WEBCAST: Brocade Communications

IT Agility: How Do You Stack Up?
Are you faced with increasing pressure to deploy technology faster? You're not alone. This year, over half of enterprises will be prioritizing building a private cloud, a concept introduced less than five years ago. View Now>>

Symantec rolls out threat-intelligence sharing with Cisco, Check Point, Palo Alto Networks
Managed security services customers get new data but have to decide whether to apply it Read More

INSIDER
Cisco takes early lead in SDN thought leadership
Everyone is vying to become the leader is the world of Software Defined Networking, but according to Network World’s 2014 survey of nearly 300 IT execs, the race is extremely wide open.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Malwarebytes aims to stop zero-day exploits on Windows
Malwarebytes today said it has begun shipping Windows-based software intended to detect and block unknown zero-day exploits. Malwarebytes says the software, called Anti-Exploit, can work as additional protection alongside traditional anti-malware.“It could be used with Symantec Endpoint, for instance,” said Pedro Bustamante, director of special projects at Malwarebytes. It works by shielding applications running on the computer. If it’s set to guard Adobe Reader, for example, Anti-Exploit will watch what files it might seek to run, and if processes indicate it’s a malicious PDF, for example, Anti-Exploit will “stop the process before the exploit can execute,” Bustamante says. Anti-Exploit is based on technology acquired when Malwarebytes bought Zero Vulnerability Labs last year.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: HP

HP ArcSight ESM Solution Helps Bank to Combat Fraud
Turkey's Finansbank needed a way to spot potential fraud among millions of electronic transactions. But implementing a commercial fraud management application would take 18 months. Based on their experience using HP ArcSight Enterprise Security Manager (ESM) for IT security operations, they decided to adapt HP ArcSight ESM for fraud management. Learn More

Biggest, baddest, boldest software backdoors of all time
The boldest software backdoors of all time "Image by Seth Anderson via FlickrIt’s always tough to ensure the software you’re using is secure, but it’s doubly difficult if the creators of the software -- or some malicious unknown third party -- has surreptitiously planted a back way in.To read this article in full or to leave a comment, please click here Read More

Most U.S. credit cards will have microchips by end of 2015
Card issuers are moving full steam ahead with migration to EMV standard, Aite Group says Read More

Hackers behind iPhone ransom attacks arrested in Russia
A man and a teenaged boy are accused of using phishing and social engineering attacks to hijack Apple IDs and lock iOS devices Read More


WHITE PAPER: Infortrend

Optimized Efficiency for SMB Datacenters
Did you know that Infortrend's EonStor DS systems are ideal solutions for storage infrastructure consolidation, high-availability clusters, server virtualization and green datacenters? And now, they're 16Gb Fibre Channel-ready. Learn more >>

Malicious advertisements on major websites lead to ransomware
Cisco said the attacks can be traced to advertisements on Disney, Facebook and The Guardian newspaper Read More

Patch Tuesday: Halfway through year, Microsoft security bulletins down 30%
Affected Microsoft software includes Internet Explorer, Windows and Lync Read More

New OpenSSL vulnerability called not as serious as Heartbleed
SANS Institute's Internet Storm Center puts new OpenSSL vulnerabilities in perspective Read More


SLIDESHOWS

Network World's 2014 State of the Network survey

Exclusive research from Network World shows that cloud and mobility are gaining in importance.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Behind the Great Firewall: What it's really like to log on from China

2. Docker 101: What it is and why it's important

3. A visual history of OS desktop environments

4. What's the best approach to building next-generation data center networks?

5. How to Clean Up Your IT Resume

6. This IT worker had to train an H-1B replacement

7. 10 countries that pay you what you're worth

8. HP unveils Cisco-like SDN switch

9. Microsoft withholds monster IE update from Windows 8.1 dawdlers

10. Microsoft Azure service lets IT control identity and access management to select applications


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: