|
White Paper: Cisco Systems Datacenter admins face a significant challenge: They need to secure the datacenter without compromising the performance and functionality that new datacenter environments enable. Learn about the 5 steps you need to take to secure your data center. Read More ▶ |
Since the malware museum opened its virtual doors in February, its collection of de-fanged DOS-based malware from the 80s and 90s has attracted nearly 1 million views. Here are the museum's most downloaded viruses: Read More ▶ | |
Many companies protect their brands by registering domain names that are very similar to their own, but manufacturers of industrial control systems don't seem to follow suit, potentially leaving customers open to malicious attacks. Read More ▶ | |
A new Mozilla fund, called Secure Open Source, aims to provide security audits of open-source code, following the discovery of key security bugs like Heartbleed and Shellshock in key pieces of the software. Read More ▶ | |
|
Twitter said it had locked and called for a password reset of some accounts after an unconfirmed claim of a leak of nearly 33 million usernames and passwords to the social network. Read More ▶ | |
This week the advanced technology developers from the Intelligence Advance Research Projects Activity (IARPA) office put out a Request For Information about how to best develop better denial and deception technologies – such as honeypots or deception servers for example -- that would bolster cyber security. Read More ▶ | |
The latest happened in April when Kepler went into "Emergency Mode" which among other things allows for priority access to ground-based communications via NASA's Deep Space Network. NASA noted at the time that the spacecraft is nearly 75 million miles from Earth, making the communication slow. Even at the speed of light, it takes 13 minutes for a signal to travel to the spacecraft and back. Read More ▶ | |
Video/Webcast: Juniper Networks Campus networks hold a critical role in enabling the success of the organization. To meet the next set of challenges, campus networks must now provide better capabilities for:
- Next generation mobility with unified wireless - Effective security in a campus setting - Improve access and integration with the Cloud Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS 40 years of Apple: Apple's most innovative products Read More ▶ |
Most-Read Stories |
0 comments:
Post a Comment