Tuesday, August 16, 2011

The BP case: Online reputation management

Google lashes out at patent trolls with Motorola buy | US and UK zombies demand top dollar

Network World Security Strategies

Forward this to a Friend >>>


The BP case: Online reputation management
Recognizing that the surge of media coverage and Internet postings was growing at a faster rate than the oil plumes, BP moved quickly to mitigate the damage began damage control – for its reputation, that is. Read More


WHITE PAPER: Riverbed

Case Study: Boston College
Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now

WHITE PAPER: Schooner Information Technology

The Short Guide to MySQL High-Availability Options
The Short Guide to MySQL High-Availability Options: An analysis of today's MySQL high-availability challenges and what asynchronous, semi-synchronous and fully synchronous replication offer toward reducing downtime, achieving full data consistency, automating failover, and simplifying administration. Read now!

Google lashes out at patent trolls with Motorola buy
Google is apparently sick of being pushed around by patent attorneys from Microsoft and Apple. Read More

US and UK zombies demand top dollar
Denizens of the malware underworld who sell access to compromised computers do so at varying rates depending on where the machines are located, researchers told the Usenix Security Symposium this week. Read More


WHITE PAPER: Kaseya

How to Launch a Successful IT Automation Initiative
In this paper, we'll look at IT automation from the corporation's perspective, and discuss the steps organizations should take before launching such an initiative. We'll hear from companies that successfully implemented computer automation platforms, what their early steps were and what they would do differently if they could repeat the process. Read now

Cops Use Device to Find Child Porn on Wireless Networks
It's not exactly rocket science to detect Wi-Fi networks, but a new device is helping law enforcement detect wireless networks and locate individuals who are suspected of downloading child pornography. Read More

Driver using two cell phones gets 12 month driving ban
This guy is the poster boy for why cell phone usage in cars should be banned in more places. According to press out of the United Kingdom, a man who was driving at 70MPH while texting on one phone and talking on the other has been banned from driving for a year. Initial reports said that the driver, David Secker was apparently using his knees to steer the car, an accusation he refuted in court apparently.... Read More


WHITE PAPER: CA Technologies

Three steps to agile change
Comprehensive IT change configuration and release management (CCRM) continues to confound and frustrate both IT and the business units for which it provides services. But by first instituting the appropriate foundational processes and supporting tools, many enterprises are experiencing renewed CCRM success. Read Now

Smartphones and corporate websites, a required match
If I remember correctly, not long after the original Apple iPhone went on sale The New York Times ran a story indicating surprise that a relatively large number of poorer people were buying the expensive phone. After some pondering, the Times concluded that the cost of the iPhone was actually small when compared to a personal computer and Internet service. The iPhone was a way that people who could not otherwise afford to be on the Internet could get reliable, reasonable speed, access for not much more per month than they were already paying for their current cellphones. Read More

Anonymous breaches San Francisco's public transport site
The hacking collective Anonymous released personal data on Sunday belonging to more than 2,000 public transport customers in the San Francisco area in retaliation for the Bay Area Rapid Transit (BART) system's shutdown of mobile phone service on Thursday night. Read More

The changing face of identity and location security
For two decades, the dominant security model has been location-centric. We instinctively trust insiders and distrust outsiders, so we build security to reflect that: a hard perimeter surrounding a soft inside. The model works best when there's only one connection to the outside, offering a natural choke point for firewall defense. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

4 reasons Windows Phone 7 will eventually beat iPhone and Android
Here are four reasons why Microsoft will be a major smartphone player in a few years. And three reasons it won't.

MOST-READ STORIES

  1. WiMAX is dead
  2. Google buys Motorola Mobility for $12.5 billion
  3. Steve Jobs chatting with Bill Gates in 1991
  4. 10 scariest hacks from Black Hat and Defcon
  5. Larry Page blogs on why he's buying Motorola Mobility
  6. iPhone 5 rumor roll-up for the week ending Aug. 12
  7. Samsung not bushwacked by EU tablet ban, says expert
  8. U.S. and U.K. zombies demand top dollar
  9. IBM says PC going way of vacuum tube and typewriter
  10. Purdue's hefty switch discounts 'unusual,' Cisco says

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment: