Search This Blog

Tuesday, May 26, 2009

Giving the IIW another shot

Malware knocks out U.S. Marshals Service network; Twitter hit with phishing attacks
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by BMC Software
rule

Choosing the Best WLA Vendor for your Environment
Which vendor is leading the job scheduling pack? Find out in this Gartner report. Learn which company has the best vision for today and tomorrow and which vendor displays the strongest ability to execute on that vision. Get critical tips on finding the best workload automation platform for your organization.

rule

Spotlight Story
Giving the IIW another shot

I headed off to the Computer History Museum in Mountain View, Calif., last week, for the latest instance of the Internet Identity Workshop. Some of you may recall that, after last fall's gathering (the IIW meets twice a year) I was less than enthusiastic. Still, people whose opinion I respect suggested I give it another chance. So I did. Read full story

Related News:

iPhones in the enterprise leaving IT pros at wit's end
LAS VEGAS--Executives smitten with iPhones are forcing enterprise IT departments to come up with ways to support the mobile devices even though big security and management questions abound. IT pros peppered panelists at a standing-room only Interop session titled "The iPhone and the Enterprise: Is this the Future of IT?" with such questions and left without many answers. One healthcare IT pro said supporting iPhones would be a nightmare given industry data protection regulations and the ability of end users to relatively easily "jailbreak" their iPhones. Another IT pro pointed out that supporting a bunch of native apps on iPhones would seem to run counter to other IT trends, such as the move toward desktop virtualization and centralized applications control. Panelist J.T. Starzecki, president of application development and consulting company iPhone Zen Masters, acknowledged that IT pros are left with the "dilemma of how to fit iPhones into their current infrastructure" in light of executives adopting iPhones for personal use and then calling on IT to support them in the business. "iPhone 2.0 made some leaps toward enterprise adoption [with support for Exchange ActiveSync, etc, but it's not where it should be," he said. One big challenge in supporting iPhones is that it's hard to find an organization that wouldn't also have a handful of other mobile device types to support, said Adam Blum, CEO of Rhomobile, which makes a framework for building native mobile device apps that can work across platforms. Supporting multiple platforms would only add to an IT department's workload, he said. "We'll always have heterogeneity," he said. While IT shops might not be happy about losing control over end devices stuffed with applications, Blum said there's not much they can do about the shift. He noted that some applications, such as GPS and cameras, must be on the end device. He pointed to the emergence of applications on iPhones and other smartphones in the enterprise as part of the seemingly never-ending back and forth nature of centralized and decentralized computing. While some IT shops might being feeling forced to support iPhones because of top execs' desires, others might be the supporters themselves. In these cases, the panelists recommended selling higher ups on iPhone support by showing first how it could benefit customers. "The wedge is 'We want to support our customers,'" Starzecki said. The panelists pointed to some high profile iPhone business apps, such as AAA enabling customers to report their location via the iPhone and Nationwide allowing insurance clients with iPhones to send in claims data, including accident photos. Among inhibitors to iPhones taking off in the enterprise is the lack of a good iTunes-like distribution channel for enterprise apps, Blum said. He said enterprise app developers can't abide by a system that wouldn't allow them to have more control over when their offerings become available. "This is an area that's ripe for innovation," he said.

Malware knocks out U.S. Marshals Service network
Malware Wednesday crippled Windows-based computer systems at the U.S. Marshals Service, which hunts federal fugitives and operates the country's witness protection program, knocking the agency's network offline.

Twitter hit with phishing attacks
Twitter users who thought friends were directing them to a "funny blog" Thursday ended up experiencing something completely different: a phishing scam.

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.


Evolution of Ethernet
Evolution of EthernetFrom 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Meeting PCI and Securing the Data Center
Discover the risks improperly implementing PCI DSS configuration controls and change processes present to the cardholding environment and how configuration assessment and file integrity monitoring can mitigate them.
Click here to download this whitepaper.


Create Your Own Agenda at IT Roadmap
Customize a day of learning just for yourself! Attend IT Roadmap Conference & Expo and explore new solutions and examine new technology across 10 relevant areas of IT. Security, Virtualization, SaaS, VoIP, Green IT and more. 10 U.S. cities in '09.
Select your city, register and attend free

 

May 26, 2009

TOP STORIES | MOST DUGG STORIES

  1. Domain name company cries croc tears over 'censorship'
  2. Why BlackBerry still beats iPhone for some
  3. Death of the mouse
  4. Leaked copies of Windows 7 RC contain Trojan
  5. RIM to bind BlackBerry to Cisco phones
  6. Top 7 reasons people quit Linux
  7. Citrix embraces Apple with iPhone virtualization
  8. Give users passwords they don't have to remember
  9. Cisco cool to Obama's tax loophole plan
  10. Use the Cisco restroom at your own risk

2009 Fave RavesNetwork World on Twitter: Get our tweets and stay plugged in to networking news

MOST-WATCHED VIDEO

  1. Notebook replaces trackpad with LCD panel

Six smart ways to grow small business IT
We picked the brains of IT professionals who work at firms that provide outsourced IT services to companies of varying sizes (most have in-house experience as well) and broke their advice down into six basic lessons
Read them all at AccelerateResults.com, a resource from IDG and AMD.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: