Search This Blog

Thursday, June 11, 2009

Working with consultants

Adobe patches 13 critical PDF bugs in first quarterly update; Evolution of the CSO
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by Ultrium
rule

Keep Storage Costs in Check with Tape
The Clipper Group outlines the real costs of migrating to a disk-based storage. You will learn about the dramatic differences between tape-based and disk-based storage in regards to floor space, hardware and energy costs. Find out why tape storage, especially, LTO-4, should be part of your long-term storage plans.

rule

Spotlight Story
Working with consultants

One of the great developments of evolution and of civilization was specialization or the division of labor: allowing individuals to become really good at specific tasks without having to worry about all the other kinds of activity required to support life. Read full story

Related News:

FBI warns of Asian-specific telephone extortion scam
The FBI today said it was warning what it called Asian business owners of a nationwide attempt to extort money via threats of violence over the phone. Offering very little detail, the FBI said the telephone calls appear to be originating from foreign countries. The caller acquires an adequate amount of open source information about the victim through Internet searches. This misleads the victim into believing the subject has personal knowledge about the victim.

Adobe patches 13 critical PDF bugs in first quarterly update
Adobe issued its first regularly-scheduled security updates on Tuesday, fixing at least 13 critical flaws reported by outside researchers and secretly patching an unspecified number of bugs found by its own team.

Evolution of the CSO
It's been almost 15 years since David Kent first came to Genzyme, a biotech firm headquartered in Cambridge, Mass., that develops medical treatments for ailments such as certain genetic diseases and some forms of cancer. In 1994, the company had less than $200 million in sales, and only about 1,000 employees-a stark contrast to its worldwide workforce of 11,000 today and the $4.6 billion in revenue it reported in 2008.

Securing the cloud
Everyone these days seems to want to talk about "the cloud". Cloud computing is the latest buzz phrase that all vendors seem  to want to attach to their product. But, as I mentioned some weeks ago ("Identity management is key to the proper operation of cloud computing", proper identity management is often lacking in the rush to cloud-enable services and applications. While the Cloud Computing Manifesto (see that earlier newsletter) pays lip service to identity needs, what's actually happening in the marketplace?

June Giveaways
Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.

Network World on Twitter? You bet we are


Windows 7 + Windows Server 2008
Windows 7We found 5 things to love and 5 things to hate about Microsoft's latest operating system versions.

Open-source management
Management appsHere are nine management apps that won't break the bank.

Meet Visualization Requirements with Ease
Think beyond the current structure of a report and personalize it with Business Intelligence Reporting Tools (BIRT) Interactive Viewer. Register for this Live Webcast scheduled for Wednesday, July 15 at 2:00 p.m. EDT/11:00 a.m. PDT, to learn how. Meet data visualization requirements faster and with less development by making BIRT web output interactive.
Register today


 

June 11, 2009

TOP STORIES | MOST DUGG STORIES

  1. Google unveils plug-in to marry Outlook, Gmail
  2. 2009 top urban legends in IT security
  3. T-Mobile: Stolen network data genuine, but fear not
  4. World's most outrageous PC cases
  5. Fedora 11 released with new virtualization, software mgmt. tools
  6. New DoS attacks threaten wireless data networks
  7. T-Mobile net reportedly hit by hacker/extortion attack
  8. 10 things you didn't know about cyberwarfare
  9. Juniper claims first with 100G Ethernet
  10. Cisco losing share across the board: analyst

Effectively Secure your Distributed Enterprise
Is your security strategy diverse enough to thwart the growing threats against your network? Enterprise networks are more distributed which requires IT professionals to pull together a variety of tools to ensure all perimeters are protected. Discover how to minimize risk while keeping costs in check.
Learn more.



Inbox too cluttered?
Take our survey to help us improve how IT professionals get the information they need.
Click to take our survey


IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: