---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <
nww_newsletters@newsletters.networkworld.com>
Date: Dec 12, 2014 8:18 AM
Subject: Did Sony really use Amazon's cloud in revenge attack?
To: <
aquarianm@gmail.com>
Cc:
Network World Daily News AM | | Conflicting reports are arising in the cloud world this week related to how Sony responded to a leak of its data. READ MORE | | Issue highlights 1. A brief history of Linux malware 2. Cisco was surprised by Arista statements: Chambers 3. IT security whiz sets sights on commercial drone management 4. INSIDER Why disaster recovery planning can save lives 5. 6 Things Nexus 9 Does That Kindle Fire HDX 8.9 Can't 6. New products of the week 12.08.2014 7. The biggest challenges faced by CIOs/CISOs heading into 2015 8. Cisco sees a data analytics fortune at the edge of the network 9. Weird science: The 10 oddest tech stories of 2014 | White Paper: Presidio Converged Infrastructure Solutions are changing the game for data centers and private cloud implementations. How can you extend your data center into a private cloud? Top five recommendations for selecting converged infrastructures. View now | Nobody's immuneImage by ShutterstockAlthough not as common as malware targeting Windows or even OS X, security threats to Linux have become both more numerous and more severe in recent years. There are a couple of reasons for that – the mobile explosion has meant that Android (which is Linux-based) is among the most attractive targets for malicious hackers, and the... READ MORE | SAN JOSE -- CEO John Chambers said the company's decision to sue data center switch rival Arista Networks now was made after surprising statements Arista made this year."We're a company that trusts," Chambers said. "I'm a leader that trusts. They made statements that caused our team to look, that surprised us. It was a difficult decision but one you had... READ MORE | The Federal Aviation Administration has taken a hard line so far against most commercial uses of unmanned aerial vehicles (i.e.,drones) for safety and privacy reasons. But one other good reason for taking things slow is that the software for managing such drones has trailed hardware development.A new company called PixiePath seeks to address the software shortage by delivering SaaS-based tools for controlling... READ MORE | White Paper: Box This report is recommended for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet. Learn more | From Katrina to Sandy, tornadoes in the planes, flooding in the south, wildfires throughout the West, natural disasters threaten our world with destruction every year. The cost to rebuild and recover is phenomenal, so companies across the globe are investing in disaster recovery solutions to mitigate their losses and protect their data from these cataclysmic events.To read this article in... READ MORE | Ranging from budget devices with basic functionality to cutting-edge tablets for gadget lovers, the world of Android tablets is packed with options. With so many choices, it's challenging to decide on the best tablet for you or someone on your gift list.The Google Nexus 9 and Amazon Kindle Fire HDX 8.9 (2014) are two of the newest and best high-end... READ MORE | Our roundup of intriguing new products from companies such as Microsoft and Watchguard Technologies READ MORE | Webcast: APC by Schneider Electric A number of forces are converging: the cloud, converged infrastructure, big data and fabric architectures to name a few. And if those weren't enough, data center professionals must keep systems up 24 by 7, keep data secure, meet compliance obligations and keep costs and energy usage under control. It's a tall order. Learn More | The year aheadImage by ShutterstockAs the year winds to a close, CIOs and CISOs are faced with a number of challenges heading into 2015. CSO recently heard from several experts about the topic, each offering their opinion on what they feel would be the most important item in the security sandbox next year.To read this article in full or to... READ MORE | If you need to know when holiday shoppers are about to hit the checkout stands or when store shelves need to be stocked, Cisco Systems says a router can tell you.The company that commercialized routers 30 years ago is now using them to bring big-data analysis to the edges of networks, where some types of data may be priceless for... READ MORE | Online telepaths, culinary AI, criminal drones -- the tech world was full of offbeat surprises this year READ MORE | White Paper: Aberdeen Group Aberdeen Group's Derek E. Brink discusses in this report the three types of insider threats that executives must watch out for, as well as five ways in which these threats are likely to occur, and how to react to them when they appear. Avoid costly security breaches with this valuable information. Learn More | | | | | | | | |
No comments:
Post a Comment