Search This Blog

Friday, August 30, 2013

VMware CTO Casado on network virtualization, security and competition with Cisco

FTC: Medical lab lost patient info on peer-to-peer network | Confidential Data Is Leaving on Workers' Mobile Devices

Network World Security

Forward this to a Friend >>>


VMware CTO Casado on network virtualization, security and competition with Cisco
How do you bring the virtualization operations model to networking? That will be the job of Martin Casado, CTO of networking and security at VMware which this week launched NSX, the company's over-arching network virtualization package. Casado was one of the creators of OpenFlow, the protocol that spawned the software defined networking (SDN) movement. Read More


WHITE PAPER: OutSystems

Why IT Struggles to Innovate and How You Can Fix It
It seems virtually impossible for IT to meet all business demands with current budgets, resources, and approaches. In this eBook we explore the root causes of IT inefficiency and discuss methods companies have used to overcome them, turning their IT departments into innovation superstars. Learn More

WHITE PAPER: Cisco Wi-Fi Challenge NWW Jun-Aug13

Cisco Connected Mobile Experiences
Whether you are in retail, hospitality, healthcare, transportation, or another industry, keeping and attracting customers is crucial to the success of your organization. Cisco Connected Mobile Experiences can help you improve customer loyalty and increase revenue. Learn more.

FTC: Medical lab lost patient info on peer-to-peer network
An Atlanta medical testing laboratory had billing information for more than 9,000 customers land on a peer-to-peer file-sharing network in 2008, the U.S. Federal Trade Commission has alleged. Read More

Confidential Data Is Leaving on Workers' Mobile Devices
Are confidential corporate documents finding their way onto employees' personal phones, laptops and tablets? You bet. Even worse, the next-generation workforce doesn't care. Read More

Time to Bridge the Gap between Identity and Security
Lots of security vendors play in the identity space. IBM is a leader in both areas while McAfee, RSA Security, and Symantec have acquired identity technologies over the past few years. These vendors present a compelling vision of tighter alignment between identity and security that is sometimes referred to as "contextual security." By unifying identity, network security, device identity, and... Read More


WHITE PAPER: Xirrus

Optimize Your Wi-Fi Network
Driven by the rapid evolution of mobile devices, the move to cloud-based applications and data, and the continued development of new wireless technologies, Wi-Fi has become the network of choice for connectivity. Most new devices no longer have wired connectivity. IT managers now count Wi-Fi as an essential business facility. Learn more.

We all may have a little Martian in us
Men are supposed to be from Mars as John Gray's iconic relationship book would have you think, but new research presented this week suggests that in reality; we all may hail from the Red Planet. Read More

10 Sorriest Technology Companies of 2013
Microsoft, Apple and Samsung among those issuing mea culpas Read More

Office 2003's burial will resurrect hacker activity
The end of Microsoft's support for popular suite come April 2014 will usher in an era of 'infinite zero-day' attacks, analyst predicts Read More


WHITE PAPER: Juniper Networks

A Proven Solution for Today's BYOD Demands
Wireless access is mission-critical for most organizations. BYOD has accelerated the need or wireless capacity, and WLANs must deliver a robust wired-like experience in today's dense environments. High-scale, third-party testing has validated Juniper's ability to support the densest BYOD environments while delivering reliable wireless access. Learn more.

Cisco cracks down on security vulnerability
Cisco Systems released security patches for Secure Access Control Server (Secure ACS) for Windows to address a critical vulnerability that could allow unauthenticated attackers to remotely execute arbitrary commands and take control of the underlying operating system. Read More

New York Times hack highlights weakness in registrar security
Because registrars are the equivalent of a hacker jackpot, they have to be more vigilant about the security of their customers, experts say Read More

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver
It can be a long climb to the top of the corporate ladder. With Labor Day in mind, we asked tech CEOs who've reached the highest rung to share their first job experiences. Some were entrepreneurs at an early age, offering lawn-mowing and scuba diving services. Others toiled in the fields and factories. Many got their hands dirty, scrubbing oil stains off asphalt, cleaning bathrooms, and shoveling monkey cages. Read More


SLIDESHOWS

Hot products from VMworld 2013

Click through to see all the latest from the show in San Francisco.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Juniper kills MobileNext mobile packet product line

2. IBM starts restricting hardware patches to paying customers

3. Old electronics don't die, they pile up

4. School starts mass social media surveillance of students for their 'safety'

5. Developers hack Dropbox, show how to access user data

6. Spear phishing led to DNS attack against the New York Times, others

7. Cisco in for a virtual fight

8. Apple's iPhone trade-in program is a game changer

9. Hot products from VMworld 2013

10. Linus Torvalds celebrates 22 years of Linux with nostalgic message


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: