Search This Blog

Tuesday, September 11, 2012

Low-cost RADIUS servers for Wi-Fi security

HP security smorgasbord upgrades include management software, IPS and printer access | Apache fires at Microsoft over IE10's DNT privacy settings

Network World Security

Forward this to a Friend >>>


Low-cost RADIUS servers for Wi-Fi security
Remote Authentication Dial-In User Service (RADIUS) servers are common in enterprise networks to offer centralized authentication, authorization and accounting (AAA) for access control. But RADIUS servers can also be useful in small and midsize networks to enable 802.1X authentication and WPA2 (802.11i) security for Wi-Fi nets. Read More


RESOURCE COMPLIMENTS OF: DameWare, part of the SolarWinds Family

Support thousands of users without leaving your desk!
Remotely manage servers, desktops and laptops in minutes! With DameWare you can remotely manage key elements of your infrastructure - domains, workstations, disk drives, & event logs. You need to resolve Windows, Mac & Linux problems for your end-users quickly, and DameWare lets you perform various critical system management tasks - remotely! Download a fully functional, free trial today and discover why thousands of system administrators use DameWare every day!

WHITE PAPER: Verizon

Verizon Enterprise Mobility Solutions Fact Sheet
Verizon Enterprise Mobility as a Service provides a cost-effective, cloud-based management and security service that enables you to manage and secure your employees' remote access. Learn More

HP security smorgasbord upgrades include management software, IPS and printer access
HP is announcing widespread improvements to its security portfolio including security management software, services, IPS platform and even printer security. Read More

Apache fires at Microsoft over IE10's DNT privacy settings
Do Not Track (DNT) is supposed to protect a user's privacy; in theory if you have it on, then it tells advertisers not to stalk you around the web, not to track, build and sell your web behavior profile to yet other third parties. When Microsoft chose to buck the W3C's DNT proposal of "explicit consent required" by the user, and instead turned on DNT by default in Internet Explorer 10, the decision... Read More

Botnet or human? Black Lotus service sorts them out to block DDoS attacks
Black Lotus is pulling the wraps of a distributed denial-of-service-mitigation service that uses behavioral factors to pick up on low-volume botnet attacks that nevertheless can cripple Web servers. Read More


WHITE PAPER: Druva

Empowering Endpoints: Unifying Data Protection
This whitepaper present IT challenges caused by an increasing mobile and collaborative workforce and discusses how Druva can solve these challenges. Read Now!

Anonymous stole Apple UDIDs from BlueToad, not the FBI
In an exclusive interview with NBC News, Paul DeHart, CEO of publishing company BlueToad, said an independent comparison between the Apple iPhone and iPad unique device identification (UDID) numbers dumped by Antisec hackers last week and the UDIDs stored in Blue Toad's database returned a 98% match. Read More

Harry Potter's Emma Watson most dangerous celebrity to search for on Web
Emma Watson, best known for her portrayal of Hermione Granger in the Harry Potter movies, has been named most dangerous celebrity to search for on the Web in McAfee's annual report. Read More

Mobile malware shifting to SMS fraud
Apps secretly bill victims for premium text services Read More


WHITE PAPER: Dell and VMware

Cloud Control: Meet the Challenges Head-On
Looking for the "On" switch for your cloud computing deployment? Right. While Cloud Computing is the gateway to business flexibility and agility, there's no "On" switch. There's no "right" way. The benefits of cloud hold tremendous promise, and challenges abound. Learn More

Anonymous hacker claims responsibility for GoDaddy.com outage
A hacker affiliated with Anonymous has claimed responsibility for knocking domain provider GoDaddy offline today. The attack appears to have also affected all sites hosted by GoDaddy. Read More

Feds Warn of Zombie Apocalypse! Buy emergency kit, but you might be a terrorist if...
How do you kill a zombie? No, not a zombie process killed via command line, but the brain-eating kind. Boom, headshot! Right? Read More

These companies help with everything from BYOD to MPLS backup, security management and enterprise search
I get to meet a lot of interesting companies in my capacity here at Network World, some of them newcomers, some more established. Here's a roundup of a few that are addressing common problems. Read More

Security Manager's Journal: DLP tool is suddenly blind to email
Data leak prevention can't be effective if it can't see any Exchange mail on the network. What happened? Read More

The Grill: NASA's Adrian R. Gardner works to manage cybersecurity challenges
Adrian R. Gardner, CIO at NASA's Goddard Space Flight Center, was the 2012 recipient of the Information Technology Leader Award from Temple University's Fox School of Business. Here, he talks about what it takes to lead IT at one of the most famous government organizations. Read More



SLIDESHOWS

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more
Before their corporate jobs, many tech CEOs got their hands dirty, scrubbing oils stains off asphalt, cleaning bathrooms, and shoveling monkey cages. Here are their stories.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. The last iPhone 5 rumor rollup, for the week ending Sept. 7
  2. Microsoft: Avoid a (bad) October surprise, lengthen RSA certificates now
  3. Facebook and Twitter and their long, slow slide into irrelevance
  4. GM to hire 10,000 IT pros as it 'insources' work
  5. Harry Potter's Emma Watson most dangerous celebrity to search for on Web
  6. Laptop fingerprint reader destroys 'entire security model of Windows accounts'
  7. 12 hot cloud computing companies worth watching
  8. iPhone 5 to be markedly thinner than the iPhone 4S, photos reveal
  9. 25 of today's coolest network and computing research projects
  10. First look: Amazon's new tablet lineup

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: