Search This Blog

Tuesday, December 08, 2009

iPhone winning over some corporate security skeptics

iPhone winning over some corporate security skeptics ; Virtual satellite cluster technology gets $75M blast
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Juniper Networks
rule

Making Way for the Next-Generation Data Center
Wouldn't it be great to manage and operate the data center as a single switch-with all the network and security services built in? This webcast will examine how to re-architect the data center to improve scale, performance and cost efficiencies, while reducing the amount of equipment needed.

Register now!

rule

Spotlight Story
The Fruit of the Poisoned Tree

On a broader scale, consider the message you would be giving some thirteen year old proto-hacker. These kids, like most kids, are tremendously susceptible to peer pressure. They already find criminal hacking attractive because it's viewed as today's counter-culture — something fairly harmless (compared with, say, dealing drugs) but exciting because it's illegal. Read full story

Related News:

iPhone winning over some corporate security skeptics
Apple's iPhone is slowly but surely winning over some enterprise security skeptics. As a result, it's now showing up alongside, or instead of, Research in Motion BlackBerries and Microsoft Windows Mobile handsets, despite the fact Apple offers none of the security and management features that are hallmarks of those two platforms.

Virtual satellite cluster technology gets $75M blast
Scientists building the complex space technology that will replace traditional spacecraft with clusters of wirelessly-interconnected satellite modules got an almost $75 million infusion from the

Will U.S. Supreme Court overhaul Sarbanes-Oxley ?
The U.S. Supreme Court will hear arguments for and against the legitimacy of the Public Company Oversight Board, an independent group established by the Security and Exchange Commission to servers as the auditing industry's watchdog over financial practice and corporate governance.

True Security Requires Extensive End-User Training
I am writing this column on my company-owned laptop while sitting on (mighty uncomfortable) bleachers in a middle-school gym waiting for my daughter's basketball game to start. This is nothing unusual in this era of the virtual workplace.

Network IPS tests reveal equipment shortcomings
An independent test and evaluation of 15 different network intrusion-protection system products from seven vendors showed none were fully effective in warding off attacks against Microsoft, Adobe and other programs.

How to fight malware
Tests of five Web security gateways reveal that performing inline inspection of network traffic is a must, as is querying cloud-based databases of the latest malware. The current crop of anti-malware tools offers strong protection against spam, spyware, phishing, botnets, rootkits, viruses and other Internet-borne attacks.

Novell grabs for big role in virtualization security
Novell this week will lay out an ambitious plan to secure applications across heterogeneous virtualization platforms at customer sites and off-premises, an effort designed to play off Novell's strengths in network and identity management.

Today from the Subnet communities

On Cisco Subnet: Cisco has 84% of Tandberg locked up and The VEPA standard -- a potential game changer?; On Microsoft Subnet: Fake Microsoft security e-mail spreads malicious code; On Google Subnet: Google releases free public DNS

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Why Print Management Matters
By implementing an effective print management strategy that includes outsourcing the management of your printers you will lower costs, create a greener IT environment and improve employee productivity.
Learn More


Why Small Companies Should Think Outside Box for Protecting Endpoints
In their "Sector Insight" study, Aberdeen Group investigated the considerations small business should take when selecting anti-malware solutions. Read this paper to learn why Aberdeen recommends small enterprises be open to endpoint security solutions from vendors other than McAfee and Symantec.
Read Now

 

December 08, 2009

MOST-READ STORIES

  1. FCC examines Verizon's doubling of early termination fees
  2. Six best BlackBerry accessories and add-ons for $100 total
  3. 2009's most awesome Android apps
  4. Thanksgiving Webcam promo leads to malware
  5. Cisco wins Tandberg with 91.1% stake
  6. Great tech gadgets: When spouses collide
  7. Microsoft releases next two pieces of Forefront security suite
  8. Is Apple testing a new iPhone model?
  9. Skype opens SIP beta program
  10. As IBM sales suffer, now's the time to buy a new mainframe

Effectively Integrating Wireline and Wireless Services for Seamless Communication
Respected consulting firm IDC examines the benefits, challenges and the choices available today that will allow you to successfully bridge your wireless and wireline services. Find out how you can simplify your communications strategy, save money and create a transparent environment.
Learn more



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: