Monday 6 June 2011

Battle looms over securing virtualized systems

Does the IRS need more options to fight identity theft? | Secretary of State Hillary Clinton responds to Google accusations that China stole e-mail from US of

Network World Security

Forward this to a Friend >>>


Battle looms over securing virtualized systems
There's growing consensus that traditional approaches to network security -- the firewall and intrusion-prevention appliances, the host-based antivirus software -- simply do not work well in virtualized environments for which they were never designed. Read More


WHITE PAPER: Netezza, an IBM Company

Oracle Exadata and Netezza TwinFin™ Compared
This ebook will provide the fundamental differences between the Netezza TwinFin® and Oracle Exadata solutions from the perspectives of query performance, simplicity of operation and value. The ebook will help you determine which solutions best meet your business needs and how to achieve optimal results from your data. Read now

WHITE PAPER: Diskeeper Corporation

NEW Diskeeper 2011 Pro Premier Edition
Diskeeper 2011 Pro Premier edition provides essential performance and efficiency increases for power workstation users as well as all the features of the Professional edition. Learn more!

Does the IRS need more options to fight identity theft?
The number of tax-related identity theft incidents is exploding and nowhere is that more obvious than at the Internal Revenue Service which as seen reports rice from 51,702 in 2008 to 248,357 in 2010. More on identity theft: IRS: Top 10 things every taxpayer should know about identity theft Read More

Secretary of State Hillary Clinton responds to Google accusations that China stole e-mail from US of
Secretary of State Hillary Clinton responds to Google accusations that China stole e-mail from US of Secretary of State Hillary Clinton responds to Google accusations that China stole e-mail from US officials From: networkworld Views: 2 0 ratings Time: 01:30 More in Science & Technology Read More


WHITE PAPER: Quest Software

Transaction Tracing through Complex Web Applications
In this Quest white paper, learn about the components of a transaction as they cross various application domains. Then, discover the difficulty in connecting transaction components for monitoring, why continuously monitoring is key and how a third-party solution simplifies the challenge. Learn more.

Hotmail and Yahoo users also victims of targeted attacks
Web mail users at Yahoo and Hotmail have been hit with the same kind of targeted attacks that were disclosed earlier this week by Google, according to security software vendor Trend Micro. Read More

IRS: Top 10 things every taxpayer should know about identity theft
As part of a look at the impact of identity theft and the Internal Revenue Service, watchdogs at the Government Accountability Office issued the IRS' top 10 list of identity theft information everyone should be aware of. Read More


WHITE PAPER: Avaya

Enabling Enterprise Network for Cloud Computing
The Data Center of the future can't be built upon the technology of the past. Learn from Gartner how a virtual network architecture from Avaya can reduce costs, and complexity, enabling an agile enterprise. Learn More

Apple strikes back at newest Mac scareware
Apple on Wednesday updated the malware engine included with Snow Leopard to detect the newest version of MacDefender, the fake antivirus program that's plagued users for the last month. Read More

MS Web Application Configuration Analyzer
Defeat hackers by running the Microsoft Web Application Configuration Analyzer with the same security checks that Microsoft uses on its own servers Read More

Cybersecurity research consortium: New tech on the way
An 18-month-old cybersecurity consortium should soon yield new technologies, participants say. Read More

Cyberattacks fuel concerns about RSA SecurID breach
Recent attacks against two defense contractors are fueling concerns about how badly RSA's SecurID two-factor authentication technology was compromised in a breach reported in March. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

4G Faceoff: ThunderBolt vs. Galaxy
We tested the Verizon Wireless HTC ThunderBolt and T-Mobile's Samsung Galaxy S 4G. Here are three things we liked/disliked about each product.

MOST-READ STORIES

  1. First look at Windows 8
  2. Clueless can hack Facebook in seconds over Wi-Fi
  3. Top 10 things every taxpayer should know about identity theft
  4. Cisco resorting to intimidation tactics
  5. Battle looms over securing virtualized systems
  6. Worst hackers ever?
  7. RSA's INsecurID
  8. 8 security considerations for IPv6 deployment
  9. Developers find a lot to love in Windows Phone 7 Mango
  10. Apple reportedly cracking down on iPad, iPhone giveaways

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment