Search This Blog

Thursday, April 22, 2010

The ultimate guide to Windows 7 security

Former hacker claims Microsoft more secure than Apple, Adobe | VeriSign warning over Apple iPad security

Network World Security

Forward this to a Friend >>>


The ultimate guide to Windows 7 security
Learn how to put AppLocker, BitLocker to Go, security accounts, and other key Windows 7 security improvements to good use Read More


RESOURCE COMPLIMENTS OF: Qualys

10 Tips for IT Policy Compliance
Whether you're just getting started with compliance or need to brush up on some details, this eBook can help. Get straight-forward answers on the role IT really needs to play in compliance, top 10 IT compliance best practices, the benefits of automation and how to prove compliance to an auditor. Learn More!

VIRTUAL EVENT: CIO, Computerworld, CSO, InfoWorld & Network World

Live Security Panel – April 28th
Join us on April 28th for a live virtual event that will provide candid, expert advice on top security challenges and issues – all from the comfort of your desktop. Get in on the discussion - from the unique challenges presented by cloud computing and virtualization to the mass adoption of social media. Attend and you may win a Kindle!

Former hacker claims Microsoft more secure than Apple, Adobe
A seasoned hacker believes Microsoft is now more secure than both Apple and Adobe, claiming Apple has only started taking seriously in the last six months. Read More

VeriSign warning over Apple iPad security
Security specialists VeriSign has warned of the security dangers iPad users might face, when Apple's device finally goes on sale in the UK late next month, particularly business users. Read More


WHITE PAPER: Dell

Windows 7 Early Adopter Case Study
Learn how Dell helped a leading business services firm complete an enterprise-wide Windows 7 migration. Learn More Now

A private investigator's tricks of the trade
PI Mall, a website for private investigators, caters not only to professionals, but regular folks who want to do some spying in their free time. Read More

Cisco WiFi open to attack
Two researchers have found a range of security vulnerabilities in Cisco WiFi products. They presented their findings at a Black Hat conference this week, according to this report on ZDNet. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Zombies are open source; humans are proprietary
Zombies are open source, humans are proprietary. Sounds like the latest self-help relationship book for geeks, but it's actually an interesting analogy. Read More

Cloud-Computing Services: Fine Print Disappointment Seen
A new Yankee Group study of enterprise cloud computing services finds cloud contracts full of disclaimers, ambiguous uptime guarantees, and uncertain privacy policies and compliance claims. Read More

Gov't regulators slam Google's privacy efforts
Google and other online companies need to stop "willfully" disregarding privacy laws in many countries when rolling out new products or privacy policies, or they may face fines and other sanctions, data protection commissioners from 10 countries said Tuesday. Read More

Windows Intune Cloud Service: A Simple FAQ
Here is a breakdown of everything you need to know about Microsoft's new cloud-based PC management and security platform aimed at midmarket companies. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

12 "White Hat" hackers you should know
These "White Hat" security researchers are ethical hackers whose discoveries and inventions shake things up - as they try to stay one step ahead of their underground "Black Hat" cousins.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Palin e-mail hack trial starts today
  2. Why computer science students cheat
  3. The first iPad casualty
  4. Google, YouTube received 10,000 gov't requests for user data
  5. Is network security a dead end career?
  6. Gov't regulators call on Google to respect users' privacy
  7. Gizmodo names Apple coder who lost "iPhone 4G"
  8. Hot spot dangers
  9. 100 iPads set for deployment at Calif. hospital
  10. Linux KVM virtualization gains steam in cloud computing market

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment:

Hotpoint FF4DK said...

Wow, Fantastic article, it’s so helpful to me, and your blog is very good,