Search This Blog

Wednesday, April 21, 2010

Is Network Security a Dead End Career?

Hot spot dangers | Interop 2010

Network World Security

Forward this to a Friend >>>


Is Network Security a Dead End Career?
Hard to believe that I ever thought I would be sitting here wondering about the state of security as a viable career path. I have built my career up as a security dude/hacker for years, but lately I have been noticing a few things. - Vendors are getting really good at detecting network anomalies and the interfaces are getting easier and easier to program. - Threat vectors have become so large that... Read More


VIRTUAL EVENT: CIO, Computerworld, CSO, InfoWorld & Network World

Live Security Panel – April 28th
Join us on April 28th for a live virtual event that will provide candid, expert advice on top security challenges and issues – all from the comfort of your desktop. Get in on the discussion - from the unique challenges presented by cloud computing and virtualization to the mass adoption of social media. Attend and you may win a Kindle!

WHITE PAPER: Aerohive

Understand the Network Impact of 802.11n
As performance and reliability increase with 802.11n, the WLAN becomes a viable alternative to the wired network for mission- critical applications. This paper outlines the drawbacks of centralized controller-based approaches and how they will provide unavoidable roadblocks when faced with the increases in bandwidth provided by 802.11n. Read More!

Hot spot dangers
Security experts say that employees are increasingly exposing personal and professional information unknowingly as they log in at Wi-Fi hot spots. Although these breaches haven't yet made big headlines, given corporate America's increasing reliance on smartphones, laptops and other portable devices, it's only a matter of time, experts say. Read More

Interop 2010
Like the RSA Security conference in March, Interop will likely offer non-stop hyperbole about all things related to cloud computing. Nevertheless, I expect a lot of additional and very useful dialogue around the following topics: Read More

Cambridge team in quantum crypto breakthrough
The rarefied field of encryption Quantum Key Distribution (QKD) has edged another step closer to real-world use. Read More


WHITE PAPER: Citrix Systems

Tolly Group Performance Report
Tolly Report: "Citrix NetScaler with nCore Outperforms F5 BIG-IP" shows you how Citrix NetScaler beat F5 in head-to-head tests - providing 3X faster Web traffic, lower latency and higher throughput. Learn More!

Report: Google attack targeted 'Gaia' password system
The information stolen from Google in cyberattacks late last year included a password system that gives users access to multiple services after just one login, according to a news report. Read More

Gov't regulators call on Google to respect users' privacy
Ten government regulators responsible for protecting the private information of their countries' citizens have sent an open letter to Google calling on the company to respect national laws on privacy. Read More

Symantec unveils beta versions of 2011 security software
Symantec has made beta versions of its Norton Antivirus 2011 and Norton Internet Security available to web users. Read More


WHITE PAPER: Dell

Windows 7 Early Adopter Case Study
Learn how Dell helped a leading business services firm complete an enterprise-wide Windows 7 migration. Learn More Now

Canning the spammers: The problem is not improving
On Nov. 23, 2009, Alan Ralsky, notorious international spammer and his son-in-law Scott Bradley were convicted of mail fraud, wire fraud and breaking the CAN-SPAM Act and were severely sentenced: 51 months in federal prison for Ralsky followed by five years of supervised release, 40 months in prison (plus five years supervised release) for Bradley, and fines of up to $250,000; several of their co-conspirators also pled guilty and were sentenced to similar or lower penalties. Read More

An employee initiative crashes up against security concerns
As a manager, I love seeing employees show initiative. So it isn't easy to say no when someone does that. But as a security manager, I am rigidly opposed to anything that would make us vulnerable. This week, initiative and security clashed. Read More

Service Manager 2010 Incident Tracking and Help Desk Support Best Practices
The following are best practices in designing your Service Manage 2010 Environment:► Develop policies and procedures for processing incidents and problems. These polices and procedures should leverage Service Manager capabilities as much as possible.► Deploy the Self-Service Web Portal to allow end users to create their own incident requests and close those requests to reduce the help desk workload.► Deploy... Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

12 "White Hat" hackers you should know
These "White Hat" security researchers are ethical hackers whose discoveries and inventions shake things up - as they try to stay one step ahead of their underground "Black Hat" cousins.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Why computer science students cheat
  2. Gizmodo names Apple coder who lost "iPhone 4G"
  3. Network Solutions sites hacked again
  4. Your BlackBerry's dirty little security secret
  5. Left 4 Dead 2's first DLC due next week
  6. Poor AT&T coverage reported at Coachella music festival
  7. Storage smackdown: Hard drives vs. SSDs
  8. 5 hot IT certification picks for 2010
  9. Vendors prep for 40/100G, more data center virtualization
  10. HP boasts "Cisco free" data center with 3Com portfolio

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: