High-tech

High-tech
Light

Friday, December 12, 2014

Did Sony really use Amazon’s cloud in revenge attack?

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 12, 2014 8:18 AM
Subject: Did Sony really use Amazon's cloud in revenge attack?
To: <aquarianm@gmail.com>
Cc:

A brief history of Linux malware. View it in your browser

Cisco was surprised by Arista statements: Chambers. View it in your browser

NETWORKWORLD
Network World Daily News AM
December 12, 2014

Did Sony really use Amazon's cloud in revenge attack?

Conflicting reports are arising in the cloud world this week related to how Sony responded to a leak of its data. READ MORE

 

Issue highlights

1. A brief history of Linux malware

2. Cisco was surprised by Arista statements: Chambers

3. IT security whiz sets sights on commercial drone management

4. INSIDER Why disaster recovery planning can save lives

5. 6 Things Nexus 9 Does That Kindle Fire HDX 8.9 Can't

6. New products of the week 12.08.2014

7. The biggest challenges faced by CIOs/CISOs heading into 2015

8. Cisco sees a data analytics fortune at the edge of the network

9. Weird science: The 10 oddest tech stories of 2014

White Paper: Presidio

Top 5 Criteria for Data Center Transition to Private Cloud

Converged Infrastructure Solutions are changing the game for data centers and private cloud implementations. How can you extend your data center into a private cloud? Top five recommendations for selecting converged infrastructures. View now

A brief history of Linux malware

Nobody's immuneImage by ShutterstockAlthough not as common as malware targeting Windows or even OS X, security threats to Linux have become both more numerous and more severe in recent years. There are a couple of reasons for that – the mobile explosion has meant that Android (which is Linux-based) is among the most attractive targets for malicious hackers, and the... READ MORE

Cisco was surprised by Arista statements: Chambers

SAN JOSE -- CEO John Chambers said the company's decision to sue data center switch rival Arista Networks now was made after surprising statements Arista made this year."We're a company that trusts," Chambers said. "I'm a leader that trusts. They made statements that caused our team to look, that surprised us. It was a difficult decision but one you had... READ MORE

IT security whiz sets sights on commercial drone management

The Federal Aviation Administration has taken a hard line so far against most commercial uses of unmanned aerial vehicles (i.e.,drones) for safety and privacy reasons. But one other good reason for taking things slow is that the software for managing such drones has trailed hardware development.A new company called PixiePath seeks to address the software shortage by delivering SaaS-based tools for controlling... READ MORE

White Paper: Box

Cloud File Sharing Solutions: Box vs. Dropbox

This report is recommended for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet. Learn more

INSIDER

Why disaster recovery planning can save lives

From Katrina to Sandy, tornadoes in the planes, flooding in the south, wildfires throughout the West, natural disasters threaten our world with destruction every year. The cost to rebuild and recover is phenomenal, so companies across the globe are investing in disaster recovery solutions to mitigate their losses and protect their data from these cataclysmic events.To read this article in... READ MORE

6 Things Nexus 9 Does That Kindle Fire HDX 8.9 Can't

Ranging from budget devices with basic functionality to cutting-edge tablets for gadget lovers, the world of Android tablets is packed with options. With so many choices, it's challenging to decide on the best tablet for you or someone on your gift list.The Google Nexus 9 and Amazon Kindle Fire HDX 8.9 (2014) are two of the newest and best high-end... READ MORE

New products of the week 12.08.2014

Our roundup of intriguing new products from companies such as Microsoft and Watchguard Technologies READ MORE

Webcast: APC by Schneider Electric

Building Tomorrow's Data Center with Converged Technologies

A number of forces are converging: the cloud, converged infrastructure, big data and fabric architectures to name a few. And if those weren't enough, data center professionals must keep systems up 24 by 7, keep data secure, meet compliance obligations and keep costs and energy usage under control. It's a tall order. Learn More

The biggest challenges faced by CIOs/CISOs heading into 2015

The year aheadImage by ShutterstockAs the year winds to a close, CIOs and CISOs are faced with a number of challenges heading into 2015. CSO recently heard from several experts about the topic, each offering their opinion on what they feel would be the most important item in the security sandbox next year.To read this article in full or to... READ MORE

Cisco sees a data analytics fortune at the edge of the network

If you need to know when holiday shoppers are about to hit the checkout stands or when store shelves need to be stocked, Cisco Systems says a router can tell you.The company that commercialized routers 30 years ago is now using them to bring big-data analysis to the edges of networks, where some types of data may be priceless for... READ MORE

Weird science: The 10 oddest tech stories of 2014

Online telepaths, culinary AI, criminal drones -- the tech world was full of offbeat surprises this year READ MORE

White Paper: Aberdeen Group

3 Insider Threats Executives Need to Watch For

Aberdeen Group's Derek E. Brink discusses in this report the three types of insider threats that executives must watch out for, as well as five ways in which these threats are likely to occur, and how to react to them when they appear. Avoid costly security breaches with this valuable information. Learn More

SLIDESHOWS

Cisco's top 10 innovations over the years

A look back at Cisco's most innovative moves in its 30 years in the industry.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco buying Neohapsis to boost security services

2. The POODLE flaw returns, this time hitting TLS security protocol

3. 11 technologies Apple has killed

4. Apple iOS 8.1.2 for iPhone, iPad addresses disappearing ringtones mystery

5. VCs bet $33M you'll want to use Avi Networks' white box hardware for app delivery

6. Patch Tuesday Dec 2014: 7 fixes, 3 critical patches for Windows, IE and Office

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. 15 essential open source tools for Windows admins

9. 5 information security trends that will dominate 2015

10. What happens next in the Cisco suit against Arista

Follow Networkworld

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

Copyright (C) 2014 Networkworld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment