A security policy is the foundation of a secure network, but it must balance security with business needs. Here are some guidelines for successful security policy development.
Network Computing
Permanent link to this post (30 words, estimated 7 secs reading time)
Categories: General.
Tags: Develop, Information, Networks, Policy, Secure, Security
By IPHere —
January 23, 2014 at 12:13 pm The Open Networking Foundation’s new working group is focused on extending OpenFlow to wireless and mobile networks.
Network Computing
Permanent link to this post (20 words, estimated 5 secs reading time)
Categories: General.
Tags: Effort, Mobile, Ramps, Wireless
By IPHere —
January 22, 2014 at 6:13 pm 10GbE adoption has been slow, but it’s finally on its way to becoming mainstream in the datacenter. Will this be the year it surpasses 1GbE?
Network Computing
Permanent link to this post (28 words, estimated 7 secs reading time)
Categories: General.
Tags: 2014, Ethernet, Gigabit, Year
By IPHere —
January 22, 2014 at 12:13 pm Buying a WLAN has become a complex process. Avoid making the wrong choice by following these recommendations for selecting a WLAN.
Network Computing
Permanent link to this post (24 words, estimated 6 secs reading time)
Categories: General.
Tags: Shop, Steps, WLAN
By IPHere —
January 21, 2014 at 6:13 pm Agency’s snooping sparks renewed discussion of ways to encrypt all Internet traffic by default, but experts cite several sticking points.
Network Computing
Permanent link to this post (23 words, estimated 6 secs reading time)
Categories: General.
Tags: AllEncrypted, Calls, Internet, Revives, Surveillance
By IPHere —
January 21, 2014 at 12:15 pm I don’t know if anyone has coined a term for it yet, but there is some variation of Murphy’s Law at play that ensures your smartphone or tablet will run out of power when you need it most. Finding a power source is generally pretty simple, but without the proper charging cable for your device you may still be out of luck.
Categories: General.
Tags: Cable, Caught, charging, Never, Without
By IPHere —
January 18, 2014 at 12:12 pm Hopefully your company will never be the victim of a massive data breach. If it is, though, and customer data is compromised, make sure you don’t follow Target’s lead when it comes to notifying customers. Target’s customer notification efforts are wrong on almost every level.
Customers are conditioned to not click on links in email messages. In the wake of a massive data breach like Target experienced, phishing scams often try to exploit the heightened awareness by sending out emails that look very legitimate.
This is a preview of
Target breach notifications are a perfect example of what not to do
.
Read the full post (143 words, estimated 34 secs reading time) Categories: General.
Tags: Breach, Example, notifications, perfect, Target
By IPHere —
January 18, 2014 at 12:14 am Software-defined networking has become a meaningless buzzword. Let’s start fresh with a new term that has strict requirements before vendors can label their products with it.
Network Computing
Permanent link to this post (29 words, estimated 7 secs reading time)
Categories: General.
Tags: Time
By IPHere —
January 17, 2014 at 6:12 pm Attackers are zeroing in on Web servers, domain name servers and datacenters in order to launch wide-scale attacks, according to Cisco security researchers.
Network Computing
Permanent link to this post (26 words, estimated 6 secs reading time)
Categories: General.
Tags: 'Under, Attack, Cisco, Infrastructure, Internet, Report, Security
By IPHere —
January 17, 2014 at 12:15 pm Datacenter operators will continue to focus on energy efficiency and security while investigating software-defined strategies this year.
Network Computing
Permanent link to this post (20 words, estimated 5 secs reading time)
Categories: General.
Tags: 2014, DataCenter, Trends, Watch
By IPHere —
January 17, 2014 at 6:15 am