Search This Blog

Thursday, June 30, 2011

Don’t MISs Bidgoli’s Second Edition: Even Better

Microsoft Researchers Find Spammers by Graphing Social Networks | Inventor of SecurID token has new authentication system

Network World Security Strategies

Forward this to a Friend >>>


Don't MISs Bidgoli's Second Edition: Even Better
Last year I called Professor Bidgoli's MIS 2010 college textbook "the missing link in college education" preparing students for real life applications of computer science and information systems. Professor Bidgoli released the second edition of his text book as MIS2. Read More


WHITE PAPER: EMC

Network Configuration & Change Management for Dummies
Read this and learn the NCCM "basics," key challenges associated with NCCM, the IT and business benefits of automating NCCM, and the top 10 reasons why automated NCCM creates value, reduces business risk, and can help ensure business goals are met. Read now

WHITE PAPER: Aerohive

SLA Compliance: Wireless Fidelity Achieved
Aerohive delivers the next level in network visibility and reactive response with a new infrastructure-side performance monitoring and response system: SLA Compliance. Read now!

Microsoft Researchers Find Spammers by Graphing Social Networks
Do you believe in the theory that only good people have lots of social media friends, while "bad people" don't have friends and don't leave many traces of themselves online? According to recent Microsoft Research, a spammer email account can be identified by the lack of connectivity to other people. Read More

Inventor of SecurID token has new authentication system
The inventor of the two-factor authentication SecurID token says the latest technology he's come up with is better because it can be used with a voiceprint biometric, plus it can be deployed for purposes of secure authentication in mobile phones, payments and cloud computing. Read More


WHITE PAPER: Raritan

Introduction to Data Center Infrastructure Management
This paper looks at how DCIM products can help you streamline operations, automate asset management, optimize resources and reduce costs. Read More

Apple Exposes Limitations of the Cloud
Apple announced that it will allow customers to download the next release of Mac OS X, codenamed "Lion," at its Apple stores. This move comes as a result of customer concern that bandwidth limitations or caps will limit their ability to download Lion through the Apple Mac store. Read More

OECD declaration on Internet policy angers EFF
The OECD on Wednesday issued a communication on developing Internet policy that appears to put pressure on Internet service providers (ISPs) to take responsibility for policing their networks. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

MasterCard blames ISP outage for site's downtime
MasterCard said on Wednesday that its main website was offline for a short period of time due to a weather-related issue at a third-party ISP and not a distributed denial-of-service (DDOS) attack as claimed by WikiLeaks. Read More

Google patches 7 bugs in Chrome browser
Google patched seven vulnerabilities in Chrome on Tuesday as it issued the second security update for its browser this month. Read More

LulzSec's parting Trojan is a false positive
The LulzSec hacking group sailed off into the sunset Saturday, leaving behind a treasure trove of stolen data along with what some antivirus programs identified as a nasty surprise for anyone who downloaded the Torrent file: a Trojan horse program. Read More

Symantec compares iOS and Android security
Apple's iOS and Google's Android smartphone platforms are more secure than traditional desktop-based operating systems, but are still susceptible to many existing categories of attacks, according toa 23-page report from security software vendor Symantec. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

12 of the slickest designs in enterprise tech gear available today
Consumer devices tend to get all the praise for their designs, but there's plenty of cool equipment to be found in the enterprise market. When hardware vendors tag-team with renowned industrial designers, the results can be impressive. Here are some of our favorites.

MOST-READ STORIES

  1. Cisco's Cius tablet to ship next month
  2. Gigabit Wi-Fi spec edges closer to reality
  3. Facebook bans KDE application, deletes user photos
  4. Symantec finds big differences in iOS, Android security
  5. Volume of data darn near indescribable ... without the iPad
  6. Geekiest wedding dress ever
  7. Microsoft patent may ruin Skype
  8. Zillow's rewrite of real-estate history upsets some homeowners
  9. Microsoft launches Office 365, glosses over cloud limitations
  10. Apple warned of phishing attack threat

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: