Thursday, June 02, 2011

Top security nightmares: Privately owned iPhones, iPads and other mobile devices

FAA: $11,000 fine for anyone caught pointing lasers at aircraft | 'Secret Law' of Patriot Act: Geolocation Tracking & Domestic Spying on Steroids?

Network World Security

Forward this to a Friend >>>


Top security nightmares: Privately owned iPhones, iPads and other mobile devices
IPhones, iPads and other employee-owned mobile gear are the most risky devices that can be connected to corporate networks, according to a new survey by ISACA, an international user group devoted to providing benchmarks and guidance for technology best practices. Read More


WHITE PAPER: Dell

Foundations of Security Information Management
This guide examines the details of each of these processes and provides best practices to build a foundation for SIM. Learn more.

WHITE PAPER: F5 Networks

Manageable Application Security
Investments in security solutions have to provide a clear value, which equals additional time spent collecting and documenting proof of this value. The latest version of F5 BIG-IP Application Security Manager(tm) (ASM), v10.1, addresses information overload and the need for agility in implementation. Learn more!

FAA: $11,000 fine for anyone caught pointing lasers at aircraft
Looking to address what has become an all-too-common problem, the Federal Aviation Administration said it will begin to impose civil penalties, or fines of $11,000 for anyone who points a laser at the cockpit of an aircraft. Read More

'Secret Law' of Patriot Act: Geolocation Tracking & Domestic Spying on Steroids?
It is with great irony that right after Congress and President Obama authorized a four-year extension of the Patriot Act, which steals our freedom, we celebrated Memorial Day to honor soldiers who fought and died to keep America free. Even more alarming is before the Patriot Act was reauthorized, members of the Senate Intelligence Committee tried to warn citizens that the power it grants the government... Read More


WHITE PAPER: Belden Wire

A Guide to Planning Your Data Center
Based on the best practice guidelines from the TIA and other expert sources, this guide focuses on the design and implementation of structured cabling systems in data centers and similar facilities, such as network equipment or computer rooms. Learn More!

SpamCop disrupts millions of e-mail accounts by blocking Yahoo e-mail servers
SpamCop has decided to block all e-mail coming from Yahoo servers, even if the e-mail is legit and the part of Yahoo's business cloud services. On Monday I was replying to a email from a customer and a vendor, when I received the message below. Remote host said: 554 5.7.1 Service unavailable; Client host [98.138.91.154] blocked using bl.spamcop.net; Blocked - see http://www.spamcop.net/bl.shtml?98.138.91.154... Read More

Security still a concern for those considering cloud move
Security concerns continue to be a key issue for organizations using or considering cloud-based services. Read More


WHITE PAPER: F5 Networks

ROI of Application Delivery Controllers
How modern offload technologies in Application Delivery Controllers can drastically reduce expenses in traditional and virtualized architectures, with a fast ROI. Learn More!

Mobile App Security: 5 Ways to Protect Your Smartphone
Wave your smartphone; buy a latte. Sounds great, doesn't it? But before running off to participate in Silicon Valley's next new thing, you might want to think about a scary downside to mobile commerce: the vulnerability of smartphones to hackers. Read More

Skype issues software fix for Windows and Mac users
Skype has released a new version of its Windows software to fix the problem that prevented some users from logging in and making calls yesterday, and plans to issue a similar update to Mac users later today, the company said. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

4G Faceoff: ThunderBolt vs. Galaxy
We tested the Verizon Wireless HTC ThunderBolt and T-Mobile's Samsung Galaxy S 4G. Here are three things we liked/disliked about each product.

MOST-READ STORIES

  1. 5 top social media security threats
  2. Worst hackers ever?
  3. 4G faceoff: ThunderBolt vs. Galaxy
  4. iPhone 5 rumor roundup for week ending May 27
  5. Windows 1.0: Still playing Reversi after all these years
  6. RSA tokens may be behind network security problems at Lockheed Martin
  7. Google Wallet: Five things you need to know
  8. Preparing for World IPv6 Day
  9. Leading FCoE server company? It ain't Cisco
  10. PBS hacked by LulzSec: Lulz boat sailed, PBS failed

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment