Friday 12 October 2012

Microsoft move hints at the death of Windows service packs

  Firefox 16 removed from installer page after vulnerability found | Internet attacks could mean Cyber Pearl Harbor, says US Defense Sec. Panetta
 
  Network World Security

Forward this to a Friend >>>


Microsoft move hints at the death of Windows service packs
Microsoft's first-time move Tuesday to update Windows 8 before the OS launches is a sign of the company's continued edging toward practices long held by rivals Apple and Google. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Improve IT Productivity with LogMein Rescue
LogMeIn Rescue lets you do more. With Rescue, IT can quickly access, diagnose and solve IT problems anywhere, worldwide. The result: Improved productivity for IT staff, improved customer satisfaction and more time for the important stuff. Stop letting cludgy remote support tools get in your way of delivering great IT support to PCs and Smartphones Do More. Try Rescue today

WHITE PAPER: Citrix Systems

Join the scale revolution for cloud ready networks
Today's cloud evolution requires a full scale revolution. Citrix TriScale technology transforms enterprise data centers into highly scalable enterprise clouds. Download this whitepaper and learn how to scale your cloud network for more elastic performance, seamless expansion and simple consolidation. Learn More

Firefox 16 removed from installer page after vulnerability found
Mozilla has temporarily removed Firefox 16 from the current installer page after it found a security vulnerability in the new version of its browser, it said on Wednesday. Read More

Internet attacks could mean Cyber Pearl Harbor, says US Defense Sec. Panetta
Internet attacks could mean Cyber Pearl Harbor, says US Defense Sec. Panetta Speaking at an event in New York on October 11, 2012, US Secretary of Defense Leon Panetta says an attack on US critical infrastructure could be the equivalent of a "cyber Pearl Harbor," From: networkworld Views: 1 0 ratings Time: 02:30 More in Science & Technology Read More

After Congress' report, what next for China's tech firms?
The House intelligence report issued Monday will bring more scrutiny to joint efforts and agreements by U.S. and China technology companies at least, but trade problems can't be ruled out either. Read More


WHITE PAPER: Cisco Systems

Cisco Wide Area Application Services Software Release 5.0
Cisco® Wide Area Application Services (WAAS) provides the industry's most scalable, highest performance WAN optimization solution. Cisco WAAS is able to improve end user experience and reduce bandwidth for key applications. Learn more.

7 spooktechular haunted house ideas
This Halloween, make yours the geekiest haunted house on the block Read More

Conficker worm still being tracked, but evidence collection slows
The notorious malware known as the Conficker worm still infects computers, a sort of wild horse with no rider, but investigators appear no closer to finding its creator. Read More

Doctor's orders: Healthcare in the cloud
Judy Klickstein is a cloud believer. As CIO of Cambridge Health Alliance, a midsized healthcare provider just outside of Boston, she's excited about the efficiencies cloud computing can bring to her organization. Read More


WEBCAST: Teradata

Big Data Done Right
View this on-demand webcast to learn how to reap the benefits of big data through a practical unified architecture; how to improve performance with in-memory technology; and how to lower costs and increase scalability through cloud computing. Register now.

Legal and technical BYOD pitfalls highlighted at RSA security conference
Allowing employees to bring their own devices to work is causing new challenges, including what happens when a device needs to be wiped or employees want to sell their smartphone or tablet. Read More

US Defense Sec. Panetta on when US military will work in cyberspace
Speaking at an event in New York on October 11, 2012, U.S. Secretary of Defense Leon Panetta explained when he believes the military would get involved in a cyber attack Read More

5 Things You Need to Know About Risk Management
Risk is everywhere and if you're just trying to minimize it within IT, you're taking an additional risk. Follow these tips and learn how to take an intelligent approach to risk management. Read More

Islamic hacktivists target three more U.S. banks
Self-described Islamic hacktivists have resumed cyberattacks on major U.S. banks, disrupting the online services of at least two of their targets. Read More

Hackers steal thousands of student records from computers at Florida college
An information breach at a Florida college has compromised information of about 279,000 students and employees, the Florida Department of Education said on Wednesday. Read More

 
 
 

SLIDESHOWS

Top 10 cloud jobs
Researchers at Dice.com have crunched the numbers to come up with a list of the top 10 most available jobs in the cloud.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. What are grand technology and scientific changes for the 21st century?
  2. The 9 most endangered IT career paths
  3. Did 'Completely Wrong' Romney Google bomb himself?
  4. Huawei: Separating fact from fiction
  5. Juniper fortifies network edge with new routers
  6. .xxx to launch porn search engine
  7. The better hire: the 50-year-old IT veteran or the fresh grad?
  8. Microsoft hints at the death of Windows service packs
  9. Cisco ONE is on track
  10. Microsoft: Users trying to get something for nothing wind up with malware
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment