Tuesday, August 12, 2014

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Is Amazon Web Services Really Down and Out? | Riverbed bolsters net mgmt. software for greater automation

Network World Cloud Computing

Forward this to a Friend >>>


The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. Read More


RESOURCE COMPLIMENTS OF: Alert Logic

Cloud Security Report
Alert Logic's Security Research Team has studied more than 220,000 security incidents from the production systems used to detect and protect customers to understand real-world threats in all types of IT infrastructure. Download the report and learn the answers to important questions. Download the Cloud Security report for the latest on securing your infrastructure.

WHITE PAPER: BMC Software

Meeting the Exploding Demand for New IT Services
In this eBook, explore the top trends driving the New IT for IT Service Management, and how leading organizations are evolving to focus on end-user experience. Learn More

Is Amazon Web Services Really Down and Out?
It's daft to say that AWS is in trouble just because it may have had one bad quarter. If anything, the ongoing price war between Amazon, Google and Microsoft reflects broader changes in the future of IT infrastructure. If anyone should be worried, it's traditional vendors, not Amazon. Read More

Riverbed bolsters net mgmt. software for greater automation
Riverbed tacked three new software modules onto its SteelCentral network management product today, broadening the features already available through that framework. Read More

Does your business need a "Data Protection Officer?"
New data-privacy regulation for the European Union expected to gain approval as early as October of this year would break new ground by requiring businesses selling goods and services to European citizens to appoint a so-called Data Protection Officer to be in compliance with the new law. Read More


WHITE PAPER: Cisco

Cisco Connected Mobile Experiences (CMX)
Amplify customer interactions with Cisco Connected Mobile Experiences. Our platform's Wi-Fi intelligence meets the needs of a growing mobile audience. And with Cisco Services, we'll help you design a mobile infrastructure that addresses your unique business goals for a high return on your investment. Learn more

FireLayers adds granular controls to SaaS applications for security and compliance
Traditional security solutions built to protect the enterprise are pretty much irrelevant when it comes to the public cloud. People are using privately-owned devices and unknown networks from anywhere to directly access cloud applications that are out of the reach of corporate governance and security controls. Read More

FCC chairman downplays net neutrality differences with Obama
The agency will not allow paid priority deals if they are bad for consumers or for innovation, Wheeler says Read More

Rackspace clarifies its IaaS message
Rackspace still offers IaaS, but only with a support package. Read More


WEBCAST: IBM

Charting Your Analytical Future
Date: August 26, 2014, 11:00 AM EDT The ability to embed prediction into multiple business processes amplifies the value that predictive analytics delivers. Yet many still see predictive analytics as a separate activity that is the responsibility of a small team of expert analysts. Register Now>>

US Veteran Affairs overhaul includes IT assessment
U.S. President Barack Obama has signed legislation focused on overhauling the Department of Veteran Affairs' troubled health-care system, including an IT review of the VA's process of scheduling patients. Read More

Cisco's new UCS fabric interconnect: no ACI?
The quietly introduced 6324 "mini UCS" has no connection to newest data center fabric Read More

Nadella leaves no doubt about who is in charge in first six months as CEO
He's had his share of hits and misses but he's made his presence felt from the start Read More

Emerging networking technology used by Apple, Cisco will frustrate firewalls
Multipath TCP improves performance but hampers security Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Netscout sues Gartner over Magic Quadrant rating

2. Why TCP/IP is on the way out

3. Amazon Fire Phone: Nice but nothing to get fired up about

4. Rackspace bows out commodity IaaS market in favor of 'managed cloud'

5. Cisco's new UCS fabric interconnect: no ACI?

6. Smartphone kill-switch bill passes California assembly

7. Emerging networking technology used by Apple, Cisco will frustrate firewalls

8. IBM/DARPA turn out brain-like 5-billion transistor superchip

9. 10 ways to get noticed at Black Hat

10. Top 20 colleges for computer science majors, based on earning potential


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cloud_computing_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: