Friday, April 02, 2010

Endpoint security gets complicated

Why ECPA Should Make You Think Twice about the Cloud | Code Writers Finally Get Security? Maybe

Network World Compliance

Forward this to a Friend >>>


Endpoint security gets complicated
Users say protecting network endpoints is becoming more difficult as the type of endpoint devices -- desktops, laptops, smartphones -- grows, making security a complex moving target. Read More


WHITE PAPER: Adobe

Collaboration Study: user Trends, IT Opportunities
A recent survey of knowledge workers shows they still rely on familiar collaboration tools such as email and telephone calls, but desire new ways to be more productive. See all the results and find out how IT can embrace current work habits and easily adapt as new technologies emerge. Read More

WHITE PAPER: IBM NWW

Five CIO challenges addressed by better change management
This white paper addresses five of the foremost change management challenges that CIOs have to meet and describes how organizations can turn these challenges into a business advantage. Learn more

Why ECPA Should Make You Think Twice about the Cloud
The Digital Due Process coalition is pushing Congress to modernize privacy laws in the United States. The coalition--comprised of technology companies and special interest groups, including Microsoft, Google, EFF (Electronic Frontier Foundation), ACLU (American Civil Liberties Union), eBay, and others--feels that existing privacy regulations do not adequately protect data in the digital era, and could stop businesses from embracing cloud computing. Read More

Code Writers Finally Get Security? Maybe
A new study finds software writers increasingly intent on baking security into their code writing, and Microsoft gets high marks for helping the process along. Read More


WHITE PAPER: Qwest

Connecting to Better Customer Service
Less than a third of surveyed IT executives believe their companies are "highly effective" at adapting to changing customer needs and priorities. Businesses that build a robust voice and data network infrastructure can achieve a high level of responsiveness, and transform customer information and feedback into actionable results. Click here.

Making E-discovery an Internal Function
NBC Universal saw requests for e-discovery services soar in just a few years. The company's CISO, Jonathan Chow, knew there had to be a more efficient and cost-effective way to handle it Read More

Protecting Sensitive Business Data on the iPad
The Apple iPad is coming, and--thanks primarily to the iPhone revolution--it is guaranteed to break out of its consumer-oriented shackles and start showing up at work. A quote from Star Trek: The Next Generation comes to mind: "Resistance is futile." Your business data will be assimilated. Read More


WHITE PAPER: Aruba Networks

Network Rightsizing Best Practices Guide
Network Rightsizing is an evolutionary approach to network design that significantly reduces costs while simultaneously increasing mobility for campus and enterprise users. This guide provides a methodology to enable IT to break away from the status quo of port-based network architectures, allowing an unprecedented reduction in cost and complexity. Read More!

5 'Great' Open-source Desktop Security Applications
Security practitioner Joseph Guarino lists five security desktop tools that will make your security program much more effective. Read More

Protect Your Data from the Next 'Card Hacker'
A federal judge sentenced the hacker behind the largest compromise of credit and debit card data in U.S. history to a 20-year sentence this week. While the exploits used to swipe data from over 130 million accounts went beyond cracking passwords, there are some basic precautions businesses should take to protect data from similar breaches and minimize the impact if a breach does occur. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. 10 funny April Fools' pranks
  2. Google changes name to Topeka, introduces text-based videos
  3. Google cracks animal translation riddle ... for Android
  4. Silicon cockroaches, 'dirty' IPv4 addresses, other Internet oddities
  5. Tech secrets: 21 things 'They' don't want you to know
  6. Hurdles multiply for H-1B seekers
  7. Fozzie Bear discovers cloud computing
  8. Feel like you're being watched at work? You may be right
  9. The oddest places to find Linux
  10. 4G essentials

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment