Friday, June 03, 2011

Top security nightmares: Privately owned iPhones, iPads and other mobile devices

5 top social media security threats | 12 great geeky dates

Network World Compliance

Forward this to a Friend >>>


Top security nightmares: Privately owned iPhones, iPads and other mobile devices
IPhones, iPads and other employee-owned mobile gear are the most risky devices that can be connected to corporate networks, according to a new survey by ISACA, an international user group devoted to providing benchmarks and guidance for technology best practices. Read More


WEBCAST: Oracle

Oracle Business Intelligence Foundation
Oracle BI Foundation Suite delivers the broadest end to end BI functionality from reporting, dashboards, scorecards, scenario modeling, forecasting to ad-hoc analysis. Register Today!

WEBCAST: Oracle

How Oracle Exalogic and Exadata Deliver Extreme Java
View this webcast to learn why Exalogic and Exadata are the definitive engineered platforms for enterprise application and database consolidation, with added advantage of extreme Java and database performance, unmatched reliability and scalability, and cloud-enabling elastic capacity. Register Today!

5 top social media security threats
Social media platforms such as Twitter, Facebook and LinkedIn increasingly are being used by enterprises to engage with customers, build their brands and communicate information to the rest of the world. Read More

12 great geeky dates
From Harry Potter roller coasters to experiencing weightlessness to your local arcade Read More

More malware apps sneak into Google Market
More malware targeting Google Android devices but pretending to be legit apps managed to sneak into Google Market over the long holiday weekend, and Google did take steps to yank them, according to a mobile security firm. Read More


WHITE PAPER: Diskeeper Corporation

NEW Diskeeper 2011 EnterpriseServer FREE 30-day trialware
Bring your largest and most mission-critical server operations to a new level of efficiency and reliability. Diskeeper 2011 EnterpriseServer provides uncompromising peak performance continuously and without requiring downtime or further management. Learn more.

Lockheed Martin acknowledges 'significant' cyberattack
Lockheed Martin Saturday night acknowledged that it its information systems network had been the target of a "significant and tenacious attack," but said that its security team detected the intrusion "almost immediately and took aggressive actions to protect all systems and data." Read More

8 security considerations for IPv6 deployment
Now that we're out of IPv4 allocations, it's time to get serious about adopting the next generation of Internet Protocol, IPv6. Read More

Checklist for a successful security assessment
A security assessment is a request to analyze the risk of an IT solution. The request is initiated by a CISO (Chief Security Officer) or ISO (Information Security Officer) within a corporation. It is used to make sure that security concerns are met before changes are made to the information technology infrastructure. There are foundation plans which evaluate the state of new applications or infrastructure. Or there are incremental plans that address changes to the foundation plan. Read More


WHITE PAPER: F5 Networks

Brute Force Protection for Web Applications
Both Denial-of-Service (DoS) and Brute Force Attacks have existed for many years, and many network devices tout the ability to withstand them. However, most of today's DoS attacks target layer 7 (L7) by overwhelming applications with seemingly valid requests and Brute Force programs can send more than one million attempts per second. Learn More!

Mac scareware gang evades Apple's new anti-malware defenses
The gang responsible for a month-long plague of fake Mac security software has already updated their "scareware" to evade defenses Apple put in place late Tuesday, a security company confirmed today. Read More

Memory encryption breakthrough claimed by NC State researchers
Researchers at North Carolina State University claim they've achieved a breakthrough in how encryption can be used in technology called non-volatile main memory, which is seen as an eventual replacement for conventional dynamic random-access memory. Read More

New malware scanner finds 5% of Windows PCs infected
One in every 20 Windows PCs whose users turned to Microsoft for cleanup help were infected with malware, Microsoft said this week. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

4G Faceoff: ThunderBolt vs. Galaxy
We tested the Verizon Wireless HTC ThunderBolt and T-Mobile's Samsung Galaxy S 4G. Here are three things we liked/disliked about each product.

MOST-READ STORIES

  1. 'Secret law' of Patriot Act
  2. Developers find a lot to love in Windows Phone 7 Mango
  3. Bluetooth touts itself as the cancer-free wireless tech
  4. Oracle proposes OpenOffice.org to Apache Incubator
  5. Computer science grads fielding 'multiple job offers'
  6. Microsoft unveils touch-oriented Windows 8
  7. SpamCop disrupts millions of e-mail accounts
  8. 10G top-of-rack switches to surge to $1 billion in sales this year
  9. IT increasingly bypassed on cloud adoption
  10. Cisco: IP traffic to quadruple by 2015

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment