Search This Blog

Monday, November 28, 2011

Two-thirds of firewall managers lack confidence in their security posture

The Eighth Annual Gibbs Golden Turkey Awards | Why Law Enforcement Can't Stop Hackers

Network World IT Best Practices

Forward this to a Friend >>>


Two-thirds of firewall managers lack confidence in their security posture
In its annual firewall management survey, Tufin Technologies uncovered some disheartening details. For example, 1 in 4 firewall managers have never conducted an audit, and 66% of the managers think their processes put them at risk of a security breach. The alarm is sounding for a giant wake-up call. Read More


WHITE PAPER: IBM

Take Your Business Relationships to the Next Level
This IBM publication provides information about IBM Social Business and includes details about the business need and the value of transformation to a social business. Read Now

WHITE PAPER: Sybase

Sybase IQ Supercharges Predictive Analytics
This white paper introduces you to Sybase® IQ—a high-performance, scalable column-store database engine which has been repeatedly proven to meet the predictive analytics needs for a wide variety of businesses. Read now.

The Eighth Annual Gibbs Golden Turkey Awards
For the eighth time, Gibbs awards those who deserve opprobrium for epic reasons Read More


WHITE PAPER: BMC

Three Steps to Effective Cloud Planning & Design
Before you build your cloud, there are many considerations. Are there security requirements? Compliance rules? Will you use public cloud resources as well? Learn more about how to plan a cloud effectively – from defining requirements to identifying the costs - in this compelling white paper from BMC Software. Learn More!

Why Law Enforcement Can't Stop Hackers
The threat that criminal hackers pose to corporate and government information systems has spiked in the past five years, according to the FBI, and shows no signs of abating. The worst part: Law enforcement is virtually powerless in cracking down on cybercrime. CIO.com investigates the challenges law enforcement officials face in investigating and prosecuting hackers. Read More


WHITE PAPER: Oracle

BPM SOA and Web 2.0: Business Transformation or Train Wreck?
The challenges faced by today's government agencies and commercial operations are many and varied. Fortunately for them, the convergence of a trio of technologies and business practices—business process management (BPM), service-oriented architecture (SOA), and Web 2.0—is providing a solution. Learn more.

Exclusive Research Shows CIOs Embrace Consumerization of IT
With BlackBerry and Apple still leading the pack, and tablets and Android rising in the ranks, CIOs surveyed by CIO magazine are widely supporting employee-owned devices Read More

Largest DDoS attack so far this year peaked at 45 Gbps, says company
A week-long DDoS attack that launched a flood of traffic at an Asian e-commerce company in early November was the biggest such incident so far this year, according to Prolexic, a company that defends websites against such attacks. Read More

WAN Optimization is Shifting from Strategic to Tactical
I was reading the recent Network World article, which highlighted the improved performance of Cisco's latest WAAS appliances (http://www.networkworld.com/reviews/2011/112111-cisco-waas-252854.html?page=2). While the results were interesting and showed that Cisco might finally be closing the gap between itself and Riverbed, it did get me thinking about the evolution of this industry and where future... Read More



SLIDESHOWS

Top IT Turkeys of 2011
You know, it just doesn't feel like Thanksgiving to me unless I have mashed potatoes, pumpkin pie, and an iPad with the annual Network World Top IT Turkeys slideshow all arranged on the table for the feast. So let's sharpen our knives and get to the carving, because these turkeys are getting cold.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Cisco reorgs again, folds net management into new cloud group
  2. Even Wales finds his wall-to-wall Wikipedia pictures 'annoying'
  3. 7 hot storage startups to watch
  4. 11 eye-popping Black Friday tablet, laptop and ereader deals
  5. 9 best practices for successful IT projects
  6. DARPA to banish 'geeky formal' way code defects are eradicated
  7. Maybe 802.11ad will dominate after all
  8. Interview with a pirate
  9. Top IT turkeys of 2011
  10. FCC chief declares AT&T/T-Mobile merger a turkey

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: