Search This Blog

Tuesday, April 06, 2010

Google Hits Restart on Buzz Privacy Settings

Is Cisco spying on users? | Cloud security: The good, bad and ugly

Network World Security

Forward this to a Friend >>>


Google Hits Restart on Buzz Privacy Settings
The launch of Buzz left Google with a black eye over several privacy mishaps. The main source of angst was the exposure of user Gmail contacts, and Google's rushed tweaks just weren't good enough. Now Google wants a total re-do--and perhaps forgiveness--with the implementation of even further fixes. Read More


WHITE PAPER: Aruba Networks

Network Rightsizing Best Practices Guide
Network Rightsizing is an evolutionary approach to network design that significantly reduces costs while simultaneously increasing mobility for campus and enterprise users. This guide provides a methodology to enable IT to break away from the status quo of port-based network architectures, allowing an unprecedented reduction in cost and complexity. Read More!

WHITE PAPER: HP

SMB: Strategy Guide to Risk Mitigation
This strategy guide offers concrete risk mitigation techniques specifically designed for midsize organizations. Learn how to proactively manage physical and virtual systems and see the early signs of infrastructure trouble to avoid outages. Read Now!

Is Cisco spying on users?
Is Cisco spying on users? A story in U.K.'s The Inquirer states that Cisco has unveiled a bandwidth usage monitoring application designed to provide insight into what type of traffic - such as video -- is using available bandwidth. Read More

Cloud security: The good, bad and ugly
While vendors work to address enterprise concerns about cloud computing security, experts warn there's no easy fix. Meanwhile, cloud service outages and criminals operating in the cloud threaten enterprise acceptance of the utility computing model. Read More

Mozilla beats Apple, Microsoft to Pwn2Own patch punch
Mozilla late yesterday patched a critical Firefox vulnerability used by a German researcher to win $10,000 for hacking the open-source browser at last week's Pwn2Own contest. Read More


E-GUIDE: APC by Schneider Electric

5 Ways to Shrink a Data Center
Most data centers can support an average density of 100 to 200 watts per sq. foot. The future of high-density computing – beyond 30 KW - will have to rely on water-based cooling, but is that cost effective? This expert guide discusses the latest energy technologies for today and the future. Read Now.

Maley Mayhem: Was Firing Justified? Five Perspectives
Pennsylvania CISO Robert Maley was fired for talking about a security incident during the recent RSA conference without approval from his bosses. Since then, he has been described as everything from a martyr in the cause of full disclosure to a careless exec who should have known better. Read More

Senators ramp up cyberwar rhetoric
Two U.S. senators urged the country to prepare for a cyberwar in an editorial that is likely to further dismay those who favor toning down the rhetoric stemming from the recent attacks against Google. Read More

The Cleanest Malware Scan
Michael Gersten wants to be absolutely sure malware can't interfere with his security scan. Read More


WHITE PAPER: Dell

Windows 7 Early Adopter Case Study
Learn how Dell helped a leading business services firm complete an enterprise-wide Windows 7 migration. Learn More Now

New cyber security threats noted in Blue Note annual report
A new report on consumer online behaviour and criminal activities on the Internet noted that new security threats have recently emerged, prompting the implementation of a mix of security solutions to protect unsuspecting victims. Read More

Ruling suggests limits on employer's access to personal e-mail
Can employers read an employee's personal e-mail composed and sent via a corporate computer, and does the employer own that e-mail? Especially if it's an e-mail to a lawyer, which raises special questions of client-attorney privilege that invoke confidentiality? Read More

No one can duck Heartland fallout until it stops
Last week's report of JC Penney trying to keep its name out of the Heartland credit-card debacle didn't get anywhere near the attention heaped upon hacker mastermind Albert Gonzalez netting himself a 20-year prison sentence in the case, so it's definitely worth a mention here. Read More

Are iPhones riskier than Android, Blackberry & Nokia phones?
iPhones appear to pose greater security risks than Android, Blackberry and Nokia smart phones, but is this really the case? An nCircle survey says yes, security expert Charlie Miller says not necessarily, and Pwn2Own sponsor TippingPoint won't say. Read More

Researchers track cyber-espionage ring to China
Researchers in the U.S. and Canada have tracked and documented a sophisticated cyber-espionage network based in China, dubbed Shadow, that targeted computers in several countries, including systems belonging to the Indian government and military. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. The iPad as iPod
  2. Cisco launches new servers, switches, SANs
  3. How Google wants to change telecom
  4. iPad as virtual desktop? Citrix says yes
  5. Enterprise cloud put to the test
  6. Microsoft releases desktop virtualization tools for Win 7
  7. Firefox: 30% of the world market
  8. As Windows 7 gains steam, VDI set to rise
  9. iPad teardown reveals first-rate design, build
  10. Slate Wars: 15 tablets that could rival Apple's iPad

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: