Search This Blog

Tuesday, August 25, 2009

How to run your IT department into the ground; The ‘Black Plague’ of Virtualization – Logistics!

How to run your IT department into the ground; The 'Black Plague' of Virtualization – Logistics!
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by Juniper Networks
rule

Dynamic Security in the Virtualized Data Center Network
Virtual data centers are creating new communications patterns within the network which cannot be secured by conventional, perimeter-oriented designs. Join Juniper Networks for a live Webcast on how to protect your data center's network, extend protection across new data flows, simply management of policy rules and consolidate separate infrastructures.

Register now.

rule

Spotlight Story
IA Policies Part 2

How do we resolve the issue of acknowledging (to ourselves) that some of our information assurance (IA) policies cannot, or should not, be strictly enforced, while at the same time conveying to staff the importance of always following IA policies? Read full story

Related News:

How to run your IT department into the ground
There seems to be some nasty goings-on in the IT department of the Veterans Administration.  The VA's inspector general is charging high-ranking officials in the agency's information technology office abused their authority, influenced the hiring of a contractor, engaged in nepotism,  oh, and engaged some unadvised hanky-panky.

The 'Black Plague' of Virtualization – Logistics!
There is no denying that virtualizing your production network will shower you with benefits - significant cost savings, streamlined disaster recovery, immediate snapshot functionality - BUT unlike most technology advances it's NOT the 'technical gotchas' that companies need to brace themselves for, it's the non-technical logistical downfalls that are so devastating.  Network security practitioners...

U.S. Says SQL Injection Caused Major Breaches
The huge data thefts at Heartland Payment Systems and other retailers resulted from SQL injection attacks and could finally push retailers to deal with Web application security flaws.

Cutbacks Could Be Causing IT Outages
An apparent increase in outages at Internet-based service providers is raising questions about whether recession-induced cutbacks are killing reliability and/or increased use of the services is clogging the Internet.

New virus spreads by attacking Borland compiler
An imaginative new virus that infects programs as they are being compiled has claimed its first scalps, infecting software sent out on a cover CD by a major German computer magazine and even other malware programs.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Do More with Less Thru Netcool?
This white paper outlines methods to help service providers improve overall operational efficiency within the service assurance operational environment. Learn how IBM Tivoli® Netcool® solutions can help service providers streamline their operations, improve responsiveness and reduce costs.
Learn More


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

August 25, 2009

TOP STORIES | MOST DUGG STORIES

  1. Debate rages: Is Cisco a better value over 3Com, HP?
  2. New Data Center: Virtualization
  3. Where not to find an IT job
  4. Symantec reveals the Web's 100 dirtiest sites
  5. ConSentry Networks goes out of business
  6. How to run your IT department into the ground
  7. Essential (and cool) laptop gear
  8. How projects really work
  9. Port 666
  10. 12 words you can never say in the office

Independent Test Results: Citrix vs. F5
Latency is an important metric when measuring Web applications. See the benchmark results from independent tester, Tolly, to learn how Citrix fared against F5 in a wide range of scenarios.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: