Tuesday, September 14, 2010

Security absurdity: US in sensitive information quagmire

VoIP and compliance regulations make strange and difficult bedfellows | Do security regulations hinder business?

Network World Security

Forward this to a Friend >>>


Security absurdity: US in sensitive information quagmire
Protecting and classifying sensitive information such as social security numbers shouldn't be that hard, but perhaps not surprisingly the US government has taken complicating that task to an art form. Read More


WHITE PAPER: Symantec

Global Threat Intelligence for the well informed SMB
Please read the "Quick Tips for SMBs" that were gleaned from the Threat Report to learn more about how to help your company protect their business information. Read Now.

WEBCAST: Certeon

Virtualize Beyond the Data Center
Join independent network expert, Jim Metzler, for an in-depth discussion on the nuances among various virtualized network components, the importance of WAN optimization in a virtual data center and an explanation of how WAN optimization virtual appliances can easily integrate into your environment. Learn More

VoIP and compliance regulations make strange and difficult bedfellows
As attacks against VoIP persist businesses not only have to defend themselves, they have to do it under the gun of regulators who want proof that security was addressed in accordance with their ever-changing rules. Read More

Do security regulations hinder business?
Government needs to better understand the realities of running profitable businesses -- and quickly -- as it imposes security regulations that can affect the profitability of corporations battling in a competitive environment. Read More


WEBCAST: Akamai Technologies

Increase Download Completion Rates
Join IDC for this live Webcast as new research on Electronic Software Delivery is revealed. Find out how to effectively monitor and deliver small and large downloads to ensure end user success and satisfaction. And because it's live, you can ask the experts questions specific to your environment. Register Today.

HP buys ArcSight: More Than Just Security Management
The waiting and guessing games are over, today HP announced its intent to buy security management software leader ArcSight for $1.5 billion. I didn't think HP would pull the trigger on another billion dollar + acquisition before hiring a new CEO but obviously I was wrong. Read More

Signing away our privacy
Gibbs refuses to sign away his privacy rights. Read More


WHITE PAPER: Extreme Networks

The High Performance Network for iSCSI
IT organizations have been focusing on creating a converged infrastructure to support high-performance iSCSI while allowing other applications to coexist on the network. Read now!

Microsoft helps Adobe block PDF zero-day exploit
Microsoft and Adobe are urging that users run Microsoft's Enhanced Migration Experience Toolkit to block ongoing attacks against the popular PDF viewer software. Read More

What Your Digital Photos Reveal About You
The moment is special: Your kid just learned how to ride a bike without training wheels. So you fire up your iPhone's camera, snap a photograph, upload the image to TwitPic, and share the evidence of your child's triumph via Twitter. Read More

AP secure content management market to grow by 15.4% in 2010
The secure content management (SCM) market in the Asia-Pacific region is set to grow 15.4 per cent in 2010 compared to just 6.3 per cent in 2009, according to Frost & Sullivan. The growth partnership service provider and research and best practice specialist, also anticipates revenues to increase to US$522 million by December 2010. Read More

Survey highlights need for access controls
We can't seem to get far from data/identity governance issues this month. Dave McKee, from Aveksa (he's actually director, senior media strategy at Schwartz Communications doing PR for Aveksa) just sent me a link to a new survey from the Association of Certified Fraud Examiners (ACFE) entitled "Who is Most Likely to Commit Fraud at Your Company? Profile of a Fraudster Drawn from ACFE Survey of Experts." Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

6 useful Wi-Fi tools for Windows
Free or cheap apps can help troubleshoot your wireless network, turn your laptop into a hot spot, and more.

IT personality types: 8 profiles in geekdom
Consider this your field guide to the flora and fauna of your work life: the eight classic personality types you'll find in virtually any reasonably sized IT department.

MOST-READ STORIES

  1. Newspaper demonstrates limitation of iPad
  2. Why Android is bad for business
  3. Is your cell phone a router?
  4. Anti-U.S. hacker takes credit for 'Here you have' worm
  5. Are your tweets costing you a new job?
  6. Are 'Here you have', 'David Leadbetter' viruses going after targets?
  7. 802.11n Wi-Fi making huge impact 1 year after standard ratified
  8. Cisco wireless controllers open to attack
  9. Gang uses Facebook to rob houses
  10. Microsoft issues service credits after cloud outage

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment