Search This Blog

Tuesday, July 05, 2011

Is the operating system dead?

How to live with malware infections | Despite controversy, federal, state wiretaps on the rise

Network World Security Strategies

Forward this to a Friend >>>


Is the operating system dead?
One of the problems dismaying information assurance professionals today is the avalanche move towards mobile devices taking over computing for most users. A recent study predicts "U.S. mobile handset data traffic will grow from 8 petabytes per month this year [2010] to 327 petabytes per month in 2015." That would translate to an annual compound growth of about 110% per year. Read More


WEBCAST: Riverbed

Faster Recovery for Windows Applications and Data
Are your backup & recovery plans up to snuff? Will you be able to restore critical systems & data quickly in the event of an outage? Learn valuable information on how to protect Windows applications & data in a distributed environment. Learn about challenges in protecting & restoring Exchange, SQL, & Windows file server, & more. Learn more!

WHITE PAPER: Riverbed

Best Practices in Business Continuity and Disaster Recovery
Business continuity and disaster recovery can mean a rapid return to operations or financial downfall. This IDC white paper highlights the challenges and best practices for implementing continuity and recovery solutions, and details how Riverbed WAN optimization solutions enable firms to meet their recovery requirements Read now!

How to live with malware infections
Get used to it: Malware can't be completely blocked or eliminated. But you can manage your PCs, mobile devices, and networks to function despite being infected Read More

Despite controversy, federal, state wiretaps on the rise
While their over-use is controversial federal and state requests for court permission to intercept or wiretap electronic communications increased 34% in 2010 over 2009 with California, New York, and New Jersey accounting for 68% of all wire taps approved by state judges. Read More

Mobile payments, PCI DSS compliance: Some clarity
Those hoping for mobile payments PCI compliance answers will have to wait a bit longer, the security council says. Read More


WHITE PAPER: Riverbed

Fine-Tune Your IT Performance
Learn how to bridge the gap between application performance management solutions that don't understand the underlying network and network management products that don't know how to map network traffic to applications. Learn more!

Safer mobile transactions
Last week ("More on biometrics") I recommended "biometric recognition as well as using passwords and SMS codes" for more secure mobile banking transactions. Long time reader Patrick O'Kane (he's chief architect for identity and access management services at Unisys) pointed me to a solution that does just that. Read More

Cybercrime fight hurt by apathy, law enforcement hurdles
General public apathy and collaboration with the law enforcement community assure that cybercrimes of all sorts will continue to rise. Read More

Hackers claims Apple online data was compromised
A list of 27 user names and encrypted passwords apparently for an Apple website was posted to the Internet over the weekend along with a warning from hacker group Anonymous that the Cupertino-based computer maker could be a target of its attacks. Read More


WHITE PAPER: IBM

Cloud Computing Drives Improvements in IT Service Delivery
IDC OPINION Cloud computing promotes a new dialogue between business and IT decision makers allowing them to define business service requirements first and then decide how to balance the use of shared, internal virtualized IT resources and external public services cost-effectively. Read now

Outsourcing to India may not be affected by privacy rules
Personal data sent to India by companies outsourcing work to service providers in the country will not be covered under the country's stringent new rules for the collection of personal data, an executive of a data protection standards company set up by the National Association of Software and Service Companies (Nasscom) said. Read More

Botmaster's extravagant spending attracted police
Conspicuous spending -- not technical sleuthing -- unearthed what may be the largest login-stealing botnet yet known, according to one expert working on the case. Read More

Traditional host-based anti-virus software losing luster?
Traditional host-based anti-malware packages just aren't that useful anymore, according to some companies that find it either doesn't protect against the main dangers they face from the Web or it simply doesn't run well in virtualized computer environments. Read More

Malicious activity alert: Anonymous hack-school grads come online in 30 days
In about a month the first graduates of the new Anonymous hacking school could start having an impact on the frequency of cybercrime. Read More

Securing Data on All Devices
Scenario: Protecting sensitive data on mobile devices Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

12 of the slickest designs in enterprise tech gear available today
Consumer devices tend to get all the praise for their designs, but there's plenty of cool equipment to be found in the enterprise market. When hardware vendors tag-team with renowned industrial designers, the results can be impressive. Here are some of our favorites.

MOST-READ STORIES

  1. NYC mayor demands $600M refund on software project
  2. Anonymous hack-school grads come online in 30 days
  3. Despite controversy, federal, state wiretaps on the rise
  4. Apple, Microsoft consortium beats Google for Nortel patents
  5. Samsung Chromebook out-selling Android tablets on Amazon.com
  6. IBM takes dim view of EU claims
  7. Traditional host-based anti-virus software losing luster?
  8. 10 compelling apps for Cisco Cius
  9. Tablet deathmatch: HP TouchPad vs. Apple iPad2
  10. HP TouchPad goes on sale to mixed reviews

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: