Calendario

Octubre 2018
LunMarMierJueVierSabDom
 << < > >>
  12345
6789101112
13141516171819
20212223242526
2728293031  

Anuncio

¿Quién está en línea?

Miembro: 0
Visitante: 1

rss Sindicación

Nov012013

Security Hole Found In Obamacare Website








Cloud, Virtualization Drive Enterprise Network Complexity






All times are ET. Disclaimer LIBOR Warning: Neither BBA Enterprises Limited, nor the BBA LIBOR Contributor Banks, nor Reuters, can be held liable for any irregularity or inaccuracy of BBA LIBOR. Disclaimer . Morningstar: 2013 Morningstar, Inc. All Rights Reserved. Disclaimer The Dow Jones IndexesSM are proprietary to and distributed by Dow Jones & Company, Inc. and have been licensed for use. All content of the Dow Jones IndexesSM 2013 is proprietary to Dow Jones & Company, Inc.
For the original version including any supplementary images or video, visit http://money.cnn.com/2013/10/29/technology/obamacare-security/index.html







Solving network security complexity with automation






The survey indicated that human error is a common security issue, with a quarter of U.K. and U.S. business having to re-do more than 60 percent of all firewall changes because they werent view implemented correctly the first time. Roughly 9 out of 10 IT and business decision-makers felt that coordination of security policy across the entire network is essential to the overall robustness of the companys defenses against complex attacks, and 67 percent of senior IT and decision-makers think security policy management across the network will become more automated over the next few years. "This research shows that network security has become too complex to manually manage, especially with the introduction of new technologies such as cloud, virtualization and IPv6," said Reuven Harrison, co-founder and chief technology officer of Tufin. "The key to meeting these challenges is automation and orchestration which will increase IT agility while maintaining security and compliance across the network." The report noted network configuration and server configuration are the IT areas most likely to become automated, and more than half (56 percent) said that system complexity was the number one root cause undermining and jeopardizing IT security efforts. Half of all respondents said the cloud would have the most impact on network security in the short term, though other key areas are network operations applications, outsourcing and virtualization-- nearly half of respondents reported more than 50 percent of their network was virtualized.
For the original version including any supplementary images or video, visit http://www.eweek.com/small-business/cloud-virtualization-drive-enterprise-network-complexity.html








obamacare code

In addition, our Cyber Security solutions also cover sectors utilizing complex production networks such as broadcast networks, telecomm operators, and educational institutions. Cytelicsa" offers a comprehensive and customizable suite of network security services and technologies. Cytelicsa" cyber security solutions are custom-designed for target industries by encompassing ICS, automation systems, SCADA, information security, IT systems, and physical security into a complete lifecycle offering. This includes: Risk Assessment of networks to determine vulnerabilities and business exposure Remediation solutions that correct network and systems vulnerabilities. Risk mitigation solutions harden the network and ensure industry best practices. Vigilance that continually detects, deters, and defends against threats. Custom network design and implementation to secure networks and ICS Byron Parker, Comsource President, said: "The launch of Cytelicsa" will uniquely position Globecomm in the Cyber Security market. Through Comsource's accredited security laboratories and network testing facilities and Globecomm's ability to deliver custom secure communications networks, we provide the flexibility to develop customized solutions for any type of cyber threat. About ComSource ComSource, Inc. ( a Globecomm company, is a leading provider of engineering services, software development, interoperability testing, and equipment evaluation for the telecommunications industry. The company supports a wide variety of telecommunications projects including logistics, acquisition, site selection, infrastructure, testing, design, and first-office simulation.
For the original version including any supplementary images or video, visit http://www.tmcnet.com/usubmit/2013/10/30/7511405.htm







ComSource Enters the Cyber Security Market with the Launch of Cytelicsa": a Specialty Suite of Network Security Solutions




Contact Center Solutions Interaction Analyzer?

Changing job roles impact Policy Management: 71% had to adopt new processes, learn new technologies and interact with new people because of trends like Cloud, IPv6 and virtualization. 55% report these new business initiatives require securitys input, and almost 1/3 report they require data from new stakeholders in order to design proper security policies. The Cloud makes a big impact: 50% of all respondents said the Cloud will have the most impact on network security in the short term. Other key areas are network operations applications, outsourcing and virtualization. Virtualization: Nearly half of respondents reported more than 50% of their network was virtualized. IPv6 is considered a big priority: 44% believe IPv6 is either important or very important to their network. Increasing network complexity: 56% said that system complexity was the number one root cause undermining and jeopardizing IT security efforts. Firewall outages are frequent: 33% of UK and US IT and business decision-makers said that their company had suffered five or more firewall-related outages in the last year - the equivalent of nearly one every other month. 17% of financial services companies reported 11 or more outages in the last 12 months. Human error is common: A quarter of UK and US business have had to re-do more than 60 percent of all firewall changes because they werent implemented correctly the first time.
For the original version including any supplementary images or video, visit http://net-security.org/secworld.php?id=15864




Admin · 96 vistas · Escribir un comentario
Oct292013

Tufin Meets New Network Security Policy Challenges With An Expanded Vision: Security Policy Orchestration











All rights reserved. This material may not be published, broadcast, rewritten or redistributed. CHATHAM, N.J., Oct. 22, 2013 -- /PRNewswire/ --Tufin Technologies today unveiled its vision for Security Policy Orchestration and launched version R13-3 of the Tufin Orchestration Suite. Security Policy Orchestration defines a new paradigm for the automated implementation of network infrastructure changes. With Security Policy Orchestration, Tufin customers can automate network layer change processes, enabling them to accelerate service and application delivery and increase IT agility, while maintaining security and compliance throughout the network. Tufin's broader vision has been formulated following in-depth analysis of industry trends, input from its wide customer base, and input from its growing partner ecosystem. "Security Policy Orchestration goes far beyond the traditional configuration and risk assessment of individual firewalls. Interoperability between systems and integration with different network security devices is essential," said Ruvi Kitov, CEO of Tufin. "Over time, our solution has evolved into a centralized platform that enables organizations to automate end-to-end policy management for firewalls, switches, routers, and load balancers." "The Tufin Orchestration Suite has been a huge asset to our business, enabling us to implement network changes up to 80% faster," said Fritz Steinmann, Director and Head of Network Engineering at SIX Group Services AG. "Because the vast majority of firewall changes are application related, Tufin actually enables us to roll out applications faster, with best practices for security and compliance baked into the change process itself. So not only are we more efficient and agile, but as our requirements continue to evolve, Tufin ensures we can adjust our Network Security Policy accordingly." Evolution from Policy Management to Policy Orchestration Tufin has identified a number of recent industry developments in network security operations which necessitate the transition from management to orchestration: Virtualization has enabled acceleration of the change process at the server level this, in turn, is creating an increased demand for automation across IT and, specifically, at the network layer IT organizations are under pressure to match the speed, convenience and self-service provisioning of Cloud environments for internal application deployment Enterprise networks are becoming larger and more complex with numerous traffic routing and shaping technologies and multiple data centers Widespread use of stateful and next-gen firewalls for external and internal network segmentation has significantly increased the size of enterprise firewall estates and evolved security policy into complex rule sets that map how business is conducted over the network The collective impact of these developments on network and security operations tasks has had a profound impact on people, processes and technology. Security Policy Orchestration is a necessity in order to keep up with the demands of the business while ensuring security and preventing an outage or a breach. Unveiling the Tufin Orchestration Suite Version R13-3 The Tufin Orchestration Suite, reflects the evolution of Tufin's development strategy over the last several years.
For the original version including any supplementary images or video, visit http://www.sacbee.com/2013/10/22/5841685/tufin-meets-new-network-security.html







Network security: Is new technology bypassing traditional controls?






Network technology trends for 2012: Network security Complexity is the biggest challenge for large enterprises. Security vulnerabilities typically arise because of misconfigurations. With only 30% to 40% of firewall rule bases used, organisations tend to expose their networks to access for which there is no business purpose. "Data leakage is seldom a problem with technology. It is not an issue of data sneaking past network controls, but of misconfiguration of those controls and a reluctance to fix known misconfigurations for fear of blocking business access to the network," said Jody Brazil, founder and chief technology officer of Kansas-based security management firm FireMon. For large corporate and government networks, he said that in addition to reactive security information event management (SIEM) , there needs to be a complementary proactive capability to build a picture of overall risk by identifying all network access. This enables organisations to reduce risk by blocking unnecessary access paths before there is a security incident.
For the original version including any supplementary images or video, visit http://www.computerweekly.com/news/2240158747/Network-Security-is-new-tech-by-passing-traditional-controls







SANS releases network security survey results




However, 80 percent are using some automated blocking - a large group (28 percent) set automatic blocking only for those events they can block with great assurance. Why aren't organizations using their IPS automated blocking features more? Results indicate that respondents want and need more information than their traditional IPS will give them before they can confidently turn on automatic blocking. Indeed, when respondents laid out their wish lists for a next-generation IPS, 79 percent say their next-generation IPSs must include more application awareness, 67 percent want more context awareness, 57 percent say they need more content awareness, and 56 percent would like full stack inspection included in their IPS capabilities. This question allowed multiple responses, and this ranking indicates that, above all, hosting UK respondents want smarter IPS devices that work with a variety of needs. "Given the industry trend toward simpler and easier interfaces, I was surprised that the overwhelming need expressed in our survey results was for more data," says SANS Analyst, Rob Vandenbrink, who authored the report. "They're also looking for better tools to integrate and process that data." To expand their IPS capabilities, respondents are planning to or are already connecting their IPS devices to other security inputs for a next-gen IPS "fabric-oriented" architecture so that their tools, working together, result in better visibility and analytics.
For the original version including any supplementary images or video, visit http://www.ciol.com/ciol/news/199323/sans-releases-network-security-survey-results




Admin · 119 vistas · Escribir un comentario
Oct272013

Woman's Immune System May Be Key To Hiv Vax








VaxInnate licensed to use 3M Drug Delivery Systems' TLR agonists






We never sell or give away your contact information. Our readers' trust comes first. Researchers say that she is an 'elite suppressor:' her immune cells could hold the key to solving the vexing riddle of creating a vaccine for HIV. "This is an extremely rare case of co-infection in a controlled, monogamous relationship, which showed us how a strong immune system in the elite suppressor kept the virus from replicating and infecting other cells," said Joel Blankson, the senior study investigator and infectious disease specialist. The woman's CD-8 T cells were able to stall roughly 90 percent of HIV replication, a duplicate of the virus that affects her husband. The researchers want to learn what kind of cytokines--immune system signaling proteins--are made by her T cells. They are also interested in learning more about why they're seeing odd activity in her human leukocyte antigen system. - check out the press release Related Articles:
For the original version including any supplementary images or video, visit http://www.fiercevaccines.com/story/womans-immune-system-may-hold-key-hiv-vaccine/2008-08-14










Data suggest that 3Ms TLR agonists could enhance vaccine potency, potentially enabling VaxInnate to develop vaccines that provide faster, more robust protection. Under the terms of the non-exclusive licensing agreement, 3M provides its TLR agonists to VaxInnate for an undisclosed licensing fee, in addition to milestone and royalty payments. Pairing our TLR agonists with VaxInnates innovative vaccine technology has the potential for increasing the effectiveness of vaccines, said Dr. Mark Tomai, PhD, Vaccine Business Development Director, 3M Drug Delivery network hardware UK Systems. The combination of VaxInnates proprietary vaccine technology with 3Ms TLR agonists could improve vaccine potency and make a major contribution to global public health, said Alan Shaw PhD, VaxInnate CEO. We look forward to this collaboration with 3M. Source3M Health Care
For the original version including any supplementary images or video, visit http://www.news-medical.net/news/20091109/VaxInnate-licensed-to-use-3M-Drug-Delivery-Systems-TLR-agonists.aspx







Formula fed~ try and boost immune system or vax for certain things?






Does she recover ok when sick? Does she get sick often? If she is all good, I would say her immune system is just fine. Breastfeeding is great, but some kids have wonderful immune systems, even though they were FF. Even if they get sick often, it still doesnt mean their immune system is bad, they just have to build natural immunity to the things that breastfeeding didnt cover. Select All Posts By This User I give her cod liver oil, a multi vitamin, yogurt and try to feed her well, although I will readily admit her diet could be better.
For the original version including any supplementary images or video, visit http://www.mothering.com/community/t/1260002/formula-fed-try-and-boost-immune-system-or-vax-for-certain-things




Admin · 89 vistas · Escribir un comentario
Oct232013

Watchguard Introduces New Network Security Visibility Solution








Cisco to buy Sourcefire, more network security deals seen






WatchGuard Dimension will come standard with the company's flagship Unified Threat Management (UTM) platform and provides a suite of visibility and reporting tools that instantly isolates and distills actionable security issues and trends, speeding network professionals' ability to set meaningful security policies. "Around the world, network security pros tell us they are Cisco routers UK drowning in logs of data and find it time consuming - or nearly impossible - to identify key issues on their networks and make proper policy decisions," said Dave R. Taylor, vice president of corporate and product strategy at WatchGuard Technologies. "In a recent report from the SANS Institute, only 10 percent of respondents felt confident in their organizations ability to analyze large data sets for security trends, even though 77 percent are collecting logs and monitoring data from systems and security devices. WatchGuard Dimension solves this challenge by instantly turning raw network data into actionable security intelligence in the big data visualization style today's users have come to expect." WatchGuard Dimension offers users a menu of visibility and reporting options to present the information in the way they find most intuitive: Executive Dashboard; Summary Reporting; Hierarchical TreeMap; and Global ThreatMap. WatchGuard Dimension is now available with WatchGuard's 11.8 launch of its XTM security platform. Other major highlights include the addition of WatchGuard Data Loss Prevention to the platform, an updated Web User Interface compatible with mobile devices, and tremendous new flexibility in the configuration of VPNs in today's more complex network environments. Republication or redistribution, including by framing or similar means, is expressly prohibited without prior written consent. Datamonitor shall not be liable for errors or delays in the content, or for any actions taken in reliance thereon
For the original version including any supplementary images or video, visit http://www.tmcnet.com/usubmit/2013/10/17/7484114.htm








Image Caption

Sourcefire shares rose 27.8 percent to $75.51 in afternoon trading while Cisco stock was down 0.3 percent at $25.64. Analysts said the valuation may be high but the deal made sense for Cisco, which has lost market share in network security to small, innovative rivals such as Juniper Networks Inc, Check Point Software Technologies, and Palo Alto Networks Inc. Cisco wants to be the top player in security and shed its reputation of lagging in that area, company security head Chris Young told analysts on a conference call. "We will not rest until we are the number one security partner for our customers, hands down," Young said. More acquisitions should be on the way in the tech security sector, which Research firm IDC has said spending this year should generate 7.8 percent revenue growth for vendors. "We view this morning's news as 'game changing' for the cyber security space as we expect a surge of consolidation to take place over the next 12 to 18 months," Daniel Ives, a tech analyst with FBR Capital Markets, said in a research note. He added that larger technology players such as IBM, Juniper, Symantec, and EMC could look to acquire smaller security players to help drive growth given the high priority security has in IT spending. Brian White, an analyst at Topeka Capital Markets, said Dell and Hewlett Packard could also be seeking to expand their security offerings, and the Sourcefire acquisition could be the beginning of more transactions. Potential targets are smaller, more nimble companies that provide up-to-date network security to combat advanced hacking attacks. Security protection needs have grown more complex with the proliferation of web applications, social media and video streaming. Palo Alto Networks, Fortinet as well as privately held FireEye and Barracuda Networks are considered top picks.
For the original version including any supplementary images or video, visit http://www.reuters.com/article/2013/07/23/us-sourcefire-cisco-offer-idUSBRE96M0F320130723







The Mobile Device & Network Security Bible: 2013 - 2020






The market is further expected to grow at a CAGR of nearly 21% over the next 7 years Enterprises and mobile network operators have made significant investments in integrated security appliances and content security gateways (including those specific to SMS/MMS security) The installation of Anti-Malware/Anti-Virus client software is fast becoming a de-facto requirement for most smartphones and tablets More than half of all enterprises allow the use of employed owned mobile devices on their networks. Enterprises thus continue to aggressively adopt SSL VPNs in their mobile security strategies to ensure connection security in addition to activity monitoring and control Mobile Device Management (MDM) services providers are eyeing on opportunities for cloud based mobile security services that extend existing security policies to enterprise mobile devices to help secure data, reduce risk and protect the enterprise, which has created a new submarket for mobile Security as a Service (SEaaS) Key Questions Answered: The report provides answers to the following key questions: How big is the mobile device and network security market, and what particular submarkets does it constitute? Who are the key players in each submarket? How is the value chain structured for each submarket and how will it evolve overtime? Which regions and countries will witness the highest percentage of growth in mobile security spending? Will recent privacy scandals have a negative impact on mobile security spending in the coming years? What known malware families are most dangerous for modern smartphones? Table of Contents 1 Chapter 1: Introduction 19 1,1 Executive Summary 19 1,3 Historical Revenue & Forecast Segmentation 22 1,4 Key Questions Answered 24 1,5 Key Findings 25 1,8 Companies & Organizations Mentioned 28 2 Chapter 2: An Overview of the Mobile Device & Network Security Market 40 2,1 The Importance of Mobile Devices & Networks 40 2.1.1 Mobile Devices Outnumber PCs & Notebooks 40 2.1.2 Supporting a Plethora of Applications & Hardware Peripherals 42 2.1.3 Vulnerability to Attacks: Opening the Market for Mobile Security 42 2,2 What Constitutes the Mobile Device & Network Security Market?
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/mobile-device-network-security-bible-160900120.html







The Practice of Network Security Monitoring, review: A hands-on guidebook




nsm-book-left

That experience convinced Bejtlich that prevention eventually fails. That doesn't mean admitting defeat though: if you can't stop all attackers getting in, then concentrate on frustrating them, using the time bought by your defences to detect them and eject them from your network. In one case study, Bejtlich describes how an attacker who eventually stole the entire payments database from the South Carolina Department of Revenue spent four weeks exploring the network before copying any files. If monitoring had detected the hacker during that month, no identity information would have been lost. For the general reader, the explanations of how network security monitoring differs from seeking vulnerabilities in your system and software, or from filtering and blocking confidential information, is a good introduction. The discussion of the impact of privacy laws on monitoring your business network is also very useful.
For the original version including any supplementary images or video, visit http://www.zdnet.com/the-practice-of-network-security-monitoring-review-a-hands-on-guidebook-7000020593/




Admin · 87 vistas · Escribir un comentario
Oct202013

Netman, Mtc's New Internet Hero








WB: BRINGING THE FLASH TO LIFE (Editorial)






Netman which is powered by MTC and relies on a stable network with recent technology upgrades and provides internet speed up to 7.2 Mbps was launched late this week. "The new mobile internet provider has the advantage of being a wireless technology therefore customers can benefit from having a stable wireless internet connection anywhere and at anytime," said Albertus Aochamub, general manager of corporate affairs at MTC in a statement. He said, Netman is endorsed by MTC and is linked to its network that provides coverage to 95% of the Namibian landscape in both prepaid and post paid connection, with point of sale points in the vast majority of the Namibian urban and rural centres. "Namibia has needed an additional internet provider in the market for some time now. MTC welcome Netman as a strong competitors among the existing internet providers and is confident that with its unbearable speed and reliability, it will surely exceed the local customers' expectations of an affordable professional and stable technology service provider. It is after all; powered by MTC," he said.
For the original version including any supplementary images or video, visit http://www.tmcnet.com/usubmit/-netman-mtcs-new-internet-hero-/2010/06/25/4870882.htm







Netman arrives home






Existing prepaid Netman packages are billed by the amount of data downloaded rather than time spent online. Netman Time is aimed at customers who are currently on the Netman Instant prepaid service and who would prefer a billing based on time spent online rather than data downloaded. To move to Netman Time, pre-paid customers should send an SMS reading #Netman Time# to the number 134. Netman Time is charged at NAD 10 per hour. Data on Netman Time is limited to 200 MB per day and is restricted to the customer's available credit. The Netman Time data speed is limited to 1 Mbps and customers operating on this class of service will not have access to the MTC Happy Hour internet offering. Categories:
For the original version including any supplementary images or video, visit http://www.telecompaper.com/news/mtc-unveils-web-service-charged-by-time-online-not-data-used--832776







MTC unveils web service charged by time online not data used






7 and Argentine No. 1 Juan Martin del Potro will skip the 2013 Davis Cup World Group opener against Germany from February 1-3, captain Martin Jaite said Sunday. "We sent emails to all the players likely to be selected and asked them to respond before December 10. Del Potro didn't answer. On December 20, he then sent me an SMS to tell me that he was not available," said Jaite. "The relationship with Del Potro isn't broken, the doors of the team are always open to him." Argentina were beaten 3-2 in this year's Davis Cup semifinals by the Czech Republic, the eventual champions. Endi
For the original version including any supplementary images or video, visit http://www.china.org.cn/world/Off_the_Wire/2012-12/24/content_27498290.htm








Image Caption

This film is going to answer a LOT of peoples questions on what it might be like to have super speed, or what it might be like to be The Flash at least, and by the time the credits roll the audience will have a whole new set of ideas and outlook on how super speed might work. The Flash has "speed mode", which he has to kick into when he uses his super speed (although his subconscious protects him in times of danger and the "speed mode" is a part of it and will take over reflexively in times of danger) - this way everything isn't moving "super slow" to him all the time, only when he wants it to. At first he "kicks into it" as sort of an accident. The Flash needs to do more than just run fast. They need to establish that he has complete control over his molecular structure and can literally do ANYTHING fast (insert sex joke here). Think fast, talk fast, read (and retain what he reads) fast, see fast, he has complete control over his body mass when he runs, etc, he can become lighter than air or build up tremendous momentum where he seems to be many times heavier than he really cisco reseller UK is to knock down a powerful opponent or barricade.
For the original version including any supplementary images or video, visit http://www.comicbookmovie.com/fansites/Netman0007/news/?a=60627







Argentina's top netman Del Potro to skip Davis Cup opener






The product will be available at all MTC's MobileHomes as from Thursday, 4 November 2010, Ekandjo assured. MTC MTC (Mobile Telecommunications Limited) was established in 1995 as a joint venture between Namibia Post and Telecommunications Holdings (NPTH), Telia and Swedfund. During May 2004, NPTH concluded a deal that saw it hold 100% of the shares in MTC by acquiring the 49% held by Telia Overseas AB and Swedfund International AB. During 2006 the sale of 34% of MTC shares to Portugal Telecom was concluded for N$1.34 billion while the Namibian government retains the remainder of the stake through NPTH. MTC currently covers 98% of the population of nearly 2 million citizens with more than 650 base stations and repeaters and offers a dual band 900/1800MHZ. The company also expanded its cellular coverage to all major towns in Namibia, including the major arterial roads.
For the original version including any supplementary images or video, visit http://www.itweb.co.za/index.php?option=com_content&view=article&id=38431




Admin · 41 vistas · Escribir un comentario

Página precedente  1, 2, 3, 4, 5, 6, 7  Página siguiente