RefBan

Referral Banners

Thursday, April 28, 2011

Google Gives Glimpse into Data Center Security Operations; Attackers Can Use IPv6 to Launch Man-in-the-Middle Attacks

Don't miss a single issue of eWEEK.com Securing the Enterprise. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Securing the Enterprise Securing the Enterprise
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Security | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - April 28, 2011
Google Gives Glimpse into Data Center Security Operations
Attackers Can Use IPv6 to Launch Man-in-the-Middle Attacks
Hackers Go for Small, Easy Kill
DHS Secretary Calls for Public-Private Alliance to Battle Cyber-Attacks
Better Protection for Personal Data on Android Phones
SPOTLIGHT
Why iPhone 5 Should Be Delayed Until 2012
Apple should not unveil a new iPhone at WWDC this year. It might not be the popular move, but it would be the smart one.
READ MORE >>
BEST OF eWEEK
IE10, Windows Phone 7 on Stage at MIX11
PlayBook Aims to Muscle In on iPad's Turf
Apple Takes On Google, Amazon in Cloud
Competition Applies IT to Social Problems
FEATURED VIDEO
Anticipate Customer Needs
Predictive analytics correct problems before they impact the customer.
WATCH NOW >>
MOST READ STORIES
10 Reasons to Use IBM WebSphere 8
The Tablet PC's First 123 Years
Reasons to Adopt Adobe CS 5.5
Features We Expect to See in iPhone 5
IN THIS ISSUE
Google Gives Glimpse into Data Center Security Operations
Three weeks after Facebook provided a highly detailed tour of its data center in Prineville, Ore., Google has taken the unprecedented step of providing a glimpse into its data center security operations, both from a physical security standpoint and a data protection angle. The search giant positioned the peek at its hardware infrastructure as a boon for businesses mulling whether or not to choose its Google Apps collaboration software.
READ MORE >>

Attackers Can Use IPv6 to Launch Man-in-the-Middle Attacks
Attackers are already using IPv6 networks to attack users on IPv4 networks. One security researcher outlines one possible attack scenario.
READ MORE >>

Sponsored by Sophos


FREE Data Leakage for Dummies Book from Sophos You need to protect your company's most valuable asset - your data. Request a book today!
Learn more.
ADVERTISEMENT
Hackers Go for Small, Easy Kill
Cyber-criminals are focusing on small, easy targets--including individuals and small businesses, but a vast majority of the breaches can be avoided with the right measures, according to a recent report from Verizon and the U.S. Secret Service.
READ MORE >>

DHS Secretary Calls for Public-Private Alliance to Battle Cyber-Attacks
In a speech to California college students, Department of Homeland Security Secretary Janet Napolitano discussed how the public, government and private industry can work together to contain rapidly evolving cyber-threats.
READ MORE >>

Better Protection for Personal Data on Android Phones
A new software program helps protect personal data on mobile phones by controlling how information is accessed by the various applications.
READ MORE >>

Featured White Papers
Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>

How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>


Featured Webcasts
Demystifying the Cloud - A Conversation with Dell's CIO & CTO!
May 10, 2011 at 4:00 p.m. Eastern / 1:00 p.m. Pacific (60 minutes)
Join Dell's Chief Innovation Officer Jim Stikeleather and Chief Technology Officer Kris Fitzgerald as they untangle the nebulous world of cloud computing. These luminaries will explain the various types of cloud services, and they'll also show how to best utilize and customize cloud computing for your environment.
REGISTER >>

Best Practices for Data Center Consolidation Initiatives
May 4, 2011 at 4:00 p.m. Eastern / 1:00 p.m. Pacific (60 minutes)
Specific government initiatives like the US Federal Data Center Consolidation Initiative (FDCCI) lay out best practice guidelines and objectives for departments and agencies to follow as they plan IT strategies for their own service requirements. This is further supported by the "25 Point Implementation Plan to Reform Federal Information Technology Management" and efforts around Defense Base Realignment and Closure (BRAC).
REGISTER >>


Sign up for complimentary digital subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360 view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Securing the Enterprise newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Securing the Enterprise, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: