Tuesday, 30 July 2013

How Intel Plans to Destroy the Legacy Data Center

Cloud EHR Lessons Learned in Haiti | Critics Urge End of Passwords, But Alternatives Not Ready for Prime Time

CIO Security

Forward this to a Friend >>>


How Intel Plans to Destroy the Legacy Data Center
These days, and with the help of Cisco and EMC, Intel is dipping its toes into the networking and storage ends of the enterprise technology pool. Add this to Intel's server expertise and the data center of the future may be at hand. Read More


RESOURCE COMPLIMENTS OF: Prolexic Technologies

Are your anti-DDoS devices helping the bad guys?
Your DDoS mitigation equipment can make SYN reflection attacks worse. While it is designed to challenge and validate connection requests, the anti-DDoS equipment will repeatedly challenge requests from spoofed IP addresses. This creates problematic backscatter toward the spoofed server. Learn how to block these attacks in this new white paper. Download the SYN Reflection white paper

WHITE PAPER: Webroot Software

PassMark Ranks Leading Endpoint Protection Products
In today's challenging security environment, using the best products that fulfill your business needs is of the essence. In this recent PassMark report, discover how eight different endpoint security software products compare on a variety of metrics to help you determine which would work best in your organization. Learn More

Cloud EHR Lessons Learned in Haiti
Strip away preconceptions about why technology doesn't or shouldn't work and people are likely to embrace the change that tech brings. That's what electronic health record and practice management software vendor athenahealth learned when it helped a hospital in Haiti implement a cloud-based EHR system. Read More

Critics Urge End of Passwords, But Alternatives Not Ready for Prime Time
With no practical alternative, a small tech group has launched a campaign to rally consumers against the use of passwords for logging into websites and services. Read More

US will not seek death penalty for Edward Snowden
Should he return to the U.S., Snowden would be eligible for a public trial by jury, according to a recent letter Read More


WHITE PAPER: Coverity

Development Testing for Competitive Advantage
Regardless of what industry they are in, more and more companies are finding themselves in the software business as they seek competitive advantage by developing and delivering increasingly complex applications to their customers. Read Now!

Microsoft: Almost 90 percent of Citadel botnets in the world disrupted in June
The malware was removed from forty percent of computers in those botnets, the company said Read More

Security Firm's 'DVR for Network Traffic' Gets Search and Analysis Boost
Security firm nPulse Technologies unveiled an updated version of its high-speed packet-capture appliance that now provides detailed search capabilities and session analysis of massive data collections. Read More

Apple Restores Key Parts of Dev Site After Attack
Eight days after taking site offline, resurrects important sections, including dev centers and downloads. Read More

Google Play Store Inundated with Scam Apps, Symantec Says
The applications, which may contain just a link to a website, can be hard to assess using automated analysis Read More


Hot Picks for the Week

1. 15 Best iPad Apps for Newbies

2. Sign up for InCITE, the weekly CITEworld newsletter on consumerization

3. 7 Most Important Tech Trends Of 2012

4. Holiday Tech Gadget Gift Guide

5. 10 Must-Know Samsung Galaxy Note II Tips and Tricks


Get more CIO peer perspective online
LinkedIn | Facebook | Twitter

You are currently subscribed to cio_security as buzzhairs.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact CIO.com, please send an e-mail to online@cxo.com.

Copyright (C) 2013 CIO, 492 Old Connecticut Path, P.O. Box 9208, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@cxo.com. **


No comments:

Post a Comment