Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


Norman AS Extends Cyber Security Awareness Month into November with New Episode in Video Series

Despite the end of the official Cyber Security Awareness Month, Norman AS, the global leader in threat discovery, malware forensics and analysis, and industrial control system protection solutions, will extend its video series several more weeks. Due to its popularity and critical nature of network security topics, the “Inside Network Security” series continues this week with the release that features previous guest, Joe Weiss, a managing partner of Applied Control Solutions.

Titled “It All Changed in One Day,” Weiss discusses the unfortunate withdrawal of cyber security discussions from most company boardrooms after 9/11. Weiss explains the majority of companies no longer viewed critical infrastructure security policies as their responsibility. What was once a business-imperative issue became a national security issue, he notes. As an illustration, Weiss commented that he spoke at a conference on September 10, 2001, attended by utilities and a wide range of companies, even a dog food manufacturer, all interested in cyber security. That changed after 9/11.

Today, spending up to $200 million on a new ERP system typically reaches the board for discussion, while an ICS upgrade of $3-5 million does not. But, most boards have scant knowledge of their organization’s vulnerability cyber threats and strategies in place to discover, analyze and mitigate these threats.

“Weiss makes several excellent points about where the focus on boardroom discussions should be. In addition to concentrating on major expenditures, directors should understand potential threats to the organization,” said video series host and Norman AS General Manager, North America, Darin Andersen. “The pendulum has swung from cyber security being a corporate issue, to a government issue, now to a collaborative issue. Coordinating activities and sharing information is critical to protecting government and corporate information and infrastructure assets.”

The complete third interview with Weiss is available today on Norman’s YouTube channel http://www.youtube.com/watch?v=jV40BDg3Io4. Norman will continue the “Inside Network Security” video series through November.

About Norman AS

Founded in Norway in 1984, Norman is a global leader and pioneer in proactive content security solutions and forensics malware tools. Norman’s proactive antimalware solutions, including malware analysis tools, network security and endpoint protection, are powered by patented Norman SandBox technology and used by security solutions providers around the world.

Norman’s unified core antimalware protection for clients, servers and network security are delivered as products and services designed to protect industrial control systems; and business communications and resources, including corporate and government networks and applications, remote employees, branch offices and extranets. Norman’s solutions are available through Norman subsidiaries and a network of global partners.

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
Many workloads are already in the cloud: Most organizations today run at least some workloads in the cloud. For newer organizations, they will often run ALL of their workloads in the cloud. For cloud-based workloads, sending log data to a cloud-based logging provider is not quite as bi...
As this year comes to a close, let's take one last look at the most pervasive cloud computing trends -- including increased usage across the different cloud service models, the key business drivers and the impact of agile innovation strategies.

Cloud computing adoption has m...
Many projected use cases for IoT won’t directly generate revenues. To achieve greater efficiency, companies are deploying IoT sensors internally throughout their organizations to optimize their use of everything from computer servers to lighting to HVAC systems to employee productivity...
Cloud computing seems to still be one of the reigning buzzwords in high-tech these days. Everything is either “in the cloud”, “powered by the cloud”, or some variation on the theme. I remember when hosted email was just that: hosted email. Today, such offerings are considered cloud off...
The book The Cyber Threat was written to provide business and government executives insight into the nature of the dynamic adversaries attacking our networks. Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a de...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE