Search This Blog

Friday, April 16, 2010

5 hot IT certification picks for 2010

Will "rare earth" manipulation cause a high-tech meltdown? | Hackers try to exploit illegal downloading fears

Network World Security

Forward this to a Friend >>>


5 hot IT certification picks for 2010
Industry organizations and vendors are broadening their IT certification training catalogs to address emerging technologies and market needs. Vendor-specific (Cisco, Microsoft) and technology-specific (network, security and open source) certifications can help advance IT careers. Read More


E-GUIDE: BlackBerry

Expert Guide: Crafting a Secure Mobility Strategy
Securing mobile data in transit and at rest is a top IT concern. This eGuide offers expert advice on simplifying management and security of smartphones, improved fail-over for DR and control of enterprise application downloads and permissions. Read now and download a free license of BlackBerry Enterprise Express to manage up to 75 users. Read Now.

WHITE PAPER: NetApp

Top 5 Hyper-V Best Practices
Read this whitepaper to get advice on everything from making sure you configure enough network connections, especially in iSCSI, to specifying the specific initiator groups and the correct LUN type when provisioning the NetApp LUN for use with Hyper-V. Learn More!

Will "rare earth" manipulation cause a high-tech meltdown?
China controls 97% of the "rare earth" materials used to build everything from hybrid cars, lasers and radar systems to satellites, cell phones and computers - a situation that could put the United States in a perilous strategic position if not fixed.  Read More

Hackers try to exploit illegal downloading fears
Hackers are exploiting the controversy surrounding illegal downloading in a bid to steal credit card details from web users, says F-Secure. Read More

Zeus botnet exploits unpatched PDF flaw
The Zeus botnet is now using an unpatched flaw in Adobe's PDF document format to infect users with malicious code, security researchers said today. Read More


VIRTUAL EVENT: CIO, Computerworld, CSO, InfoWorld & Network World

Live Security Panel – April 28th
Join us on April 28th for a live virtual event that will provide candid, expert advice on top security challenges and issues – all from the comfort of your desktop. Get in on the discussion - from the unique challenges presented by cloud computing and virtualization to the mass adoption of social media. Attend and you may win a Kindle!

Spam volumes grew 6 percent last year, says Google
Despite security researchers' efforts to cut spam down to size, it just keeps growing back. The volume of unsolicited email in the first quarter was around 6 percent higher than a year earlier, according to Google's e-mail filtering division Postini. Read More

Privacy in a mobile world: Massachusetts data privacy law
The Massachusetts Data Privacy law, effective as of March 1, 2010, states that all businesses that collect personal data from or about Massachusetts residents will need to adopt a comprehensive written security program. Unlike most state-based data privacy laws, which focus primarily on public disclosure once a breach occurs, the new Massachusetts law prescribes that more stringent protective measures be taken to prevent breaches from occurring in the first place. Read More

Senators question Cyber Command's role
The main focus of the U.S. Department of Defense's new Cyber Command will be protecting military networks, not engaging in cyberwarfare, the nominee to head the organization said Thursday. Read More


WHITE PAPER: Cisco Systems Inc.

The Full Story on WAAS Cost Saving Benefits
Wide Area Application Services (WAAS) can deliver a very favorable ROI within 11 months says Forrester Consulting in this informative report. WAAS lets you effectively choose how to deploy applications, store data and provision infrastructure services between branch and data center locations. Learn More

Obama does the hard sell NASA's future
President Obama took to the heart of the NASA community today to promote his vision of the future of the space program.   In a speech at NASA's Kennedy Space Center, Obama said his plan for Read More

Oracle issues emergency Java patch to stop zero-day attacks
Oracle today patched a critical Java vulnerability that is being exploited by hackers to install malicious software. Read More

In data breaches, keeping number of records lost secret can protect stock prices
When companies publicly declare that they have suffered a data breach, it's best not to reveal how many individual records were involved if they don't want to take a hit in their stock prices, according to a study. Read More

Apple releases new Leopard, Snow Leopard Security Update
Apple on Wednesday released a security update for users of Mac OS X 10.5 Leopard and 10.6 Snow Leopard. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

10 useful Google Chrome Experiments
Google's Chrome Experiments is a Web site that showcases JavaScript programs which deliver a rich user-graphics experience. To date, there are about 80 projects featured on Chrome Experiments. Here are the 10 most useful.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. How to get the best cell phone service possible
  2. Mystery solved: Why time stands still at 9:42 on iPhone
  3. Hackers exploit new Java zero-day bug
  4. Cisco product delays opening doors for rivals
  5. Data centers push back on US efficiency requirement
  6. AT&T coverage a concern, not speed
  7. Microsoft acts to avoid Windows blue screen repeat
  8. Man who left USB drive in shared PC waived privacy claims
  9. Gmail spam uses fake addresses to spread malware
  10. Apache project server hacked, passwords compromised

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: