Friday, January 13, 2012

Microsoft to launch real-time threat intelligence feed

UPDATED: The Best of CES 2012 | Can you trust data-recovery service providers?

Network World Compliance

Forward this to a Friend >>>


Microsoft to launch real-time threat intelligence feed
Microsoft is looking to share its wealth of security information with the world through a new real-time threat intelligence feed, the company recently announced at the International Conference on Cyber Security in New York. Read More


WHITE PAPER: Raritan

Why Managing VMs is So Complex
Because virtual servers coexist with nonvirtualized ones, it effectively doubles the tools and efforts relevant to data center administration. Discover how a unified, out-of-band approach that aggregates management tools into a single, consolidated platform, renders the virtual and physical layers transparent from an IT management perspective. Read now!

WHITE PAPER: Akamai Technologies, Inc.

Understanding Web Application Security
This paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection. Learn more

UPDATED: The Best of CES 2012
Smartphones, tablets, unique gadgets and yes, Ultrabooks make a splash at CES 2012 Read More

Can you trust data-recovery service providers?
Data-recovery service providers are supposed to be saving important data for you when something goes wrong -- a drive crashes or storage device is dropped, and no backup is available. But do you trust them with the important data you let them recover or could they actually be a source for a data breach? Read More

Lawsuit claims Symantec sells scareware-like products
Symantec has been accused in a lawsuit of California's unfair competition laws and fraudulent inducement by using scareware-like tactics to trick users into buying licenses for its PC utility-type products. Read More


WHITE PAPER: Aerohive

Aerohive Corporate Brochure
The way that Wi-Fi is being used and the requirements on an enterprise Wi-Fi network are going through a fundamental and generational change, so much so that we are calling it Wireless 2.0. It's not a new term, but it is a relevant one. Read now.

Virtual-security appliances winning users over traditional messaging-security software
There's no question enterprises want messaging security -- the market for products and services worldwide reached almost $3.2 billion last year, up from $2.7 billion in 2010, and will grow to $4.78 billion in 2015, according to research firm IDC. But a fundamental shift is occurring that foresees businesses favoring virtual-security appliances over more traditional messaging security software. Read More

Passwords aren't dead, though maybe yours should be
Despite all those "death to passwords" chants, some say it's still a solid form of authentication -- when users aren't being stupid about theirs. Read More

IBM software eases role-based security operations
IBM this week announced an identity-management analytics tool that eases what can be a tedious job for information-technology managers -- defining roles for employees in order to establish policy-based access to a network and application resources. Read More


WHITE PAPER: Riverbed

Forrester: IT Platform to Optimize and Consolidate
In this report, Forrester investigates the reasons why you should consider WAN optimization solutions as the best way to gain better IT performance, cost savings, and greater flexibility for your business. And it's also a smart network improvement investment over the long-term. Get the facts about WAN optimization in this study. Read now!

Adobe plugs 6 critical holes in Reader
Adobe on Tuesday patched six vulnerabilities in the newest version of its popular Reader PDF viewer, making good on a late-2011 promise when it shipped an emergency update for an older edition. Read More

Public attack code aimed at Windows Web servers works, says Symantec
Researchers at Symantec yesterday confirmed that working attack code published Jan. 6 can cripple Web servers running Microsoft's ASP .Net. Read More

What does 2012 have in store for Anonymous?
Anonymous had a busy year in 2011 pushing its hacker-activist agenda on companies around the Web, to the point where just the sound of the hacker group's name can send shivers down the spine of many a CIO. Anonymous in 2011 took on everything from HB Gary to a Mexican cartel, from oil companies to banks, from NBC to a transportation site. The group has positioned itself as a kind of Internet-based Robin Hood; when it hacked banks, the group claimed it was helping "the 99%" by giving money from the banks back to the people who rightfully deserved it. What have companies learned from this year of terror? The most that can be said is that corporate security needs to be shored up. At a conference panel in August it was evident that instead of battening down the security hatches, some companies were looking to just lessen the economic impact of a hack on their site. Network World has assembled some of the key stories surrounding Anonymous, the reactions from enterprise IT and their advice for surviving an attack, in a special PDF report that is free with Insider registration. So take a peek and then register to receive this package of stories about hackers' doings last year and what can be done next. Download "Hacktivists vs. the World" today. [[link]] Read More



SLIDESHOWS

CES 2012 ultrabooks and tablets
Ultrabooks! Ultrabooks! That's the official biggest buzzword for this year's Consumer Electronics Show in Las Vegas. Ultrabooks! In honor of these purportedly magical super-thin laptops, we've decided to make a compilation of some of the ultrabooks you'll see at CES next week. And for good measure, we've thrown in a tablet that will garner a lot of attention as well. Enjoy!

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. IBM wins most patents for 19th straight year
  2. New era for Web site names begins Thursday
  3. 4 sweet smartphones from CES 2012
  4. 5 reasons Linux Mint is better than Ubuntu
  5. The best of CES 2012
  6. Apple's HDTV and the challenge of subscription programming
  7. Microsoft's Steve Ballmer talks Windows 8
  8. Google search strips privacy from "Your World"
  9. IPhone 5 rumor rollup for the week ending Dec. 31
  10. Data center networking discontinuity

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: