Search This Blog

Thursday, August 18, 2011

Can the Obama Administration fix your identity management problems?

Dropbox cloud was a haven for data thieves, researchers say | Whatever Happened to Microsoft Forefront Endpoint Protection?

Network World Security

Forward this to a Friend >>>


Can the Obama Administration fix your identity management problems?
Can the Obama administration fix your identity management problems? Read More


WHITE PAPER: HP

HP IT Migrates to an all HP network
It's no surprise when a high-tech company uses its own products. However, the story of how HP recently migrated its own network to HP Networking equipment has unique aspects that make it relevant to all enterprises in any industry or market segment. Read now

WHITE PAPER: GFI Software

Security Considerations for SMEs
It is never possible to guarantee that a company is totally secure or that a breach will not occur, however implementing the latest tools and providing ongoing, end-user education will minimize those risks and allow companies to focus more on growing their business rather than repairing it. Read now!

Dropbox cloud was a haven for data thieves, researchers say
Files entrusted to cloud-storage provider Dropbox were susceptible to unauthorized access via three attacks devised by security researchers, but the provider has since closed the vulnerabilities. Read More

Whatever Happened to Microsoft Forefront Endpoint Protection?
Back in 2007, Microsoft shook the security world when it entered the endpoint security market with what was then called Forefront Client Security (now Microsoft Forefront Endpoint Protection). Forefront was positioned as the endpoint security market for the commercial market while its sister product, OneCare, was aimed at the consumer market. This created a market fire storm, especially at companies... Read More

Brace for email-attachment malware spree
A sizeable spike in malicious email attachments is just subsiding, but if history is any indicator, several smaller spikes are about to follow that use even more deceptive means than their predecessors. Read More


WEBCAST: Riverbed

The Network Realities of Desktop Virtualization
How do you separate promise from reality? Watch this webinar and learn how to avoid the pitfalls that can doom your virtual desktop projects, and more. Learn more!

Report: Spam is at a two-year high
Spam - particularly the kind with malicious attachments - is exploding, reaching a two-year high overall, which includes the spike last fall just before the SpamIt operation folded its doors, a security firm says. Read More

Military Plans to Squash Civil Unrest in the USA
We know the U.S. government monitors social networks for Intelligence, but would that monitoring of technology turn out the same way as it did for the UK if civil unrest and London-like riots happened in the states? Among other things, the UK arrested a 20-year-old man "for allegedly organizing a giant water gun fight via the Blackberry Messenger service and Facebook," and now has sentenced two men... Read More

On Linux's 20th anniversary, recounting past slights from Microsoft
On the 20th anniversary of Linux. the free operating system's biggest proponents threw a party to celebrate its success and scoff at attacks launched by Microsoft, its biggest rival. Read More


WHITE PAPER: F5

Wide Area Application Architecture and Exchange 2010
Massive consolidation can lead to single points of failure which could interrupt service of critical applications. ESG believes that this risk should be addressed by building applications on a Wide Area Application Architecture (WAAA) foundation, spreading applications across multiple data centers. Learn More!

Mozilla ships Firefox 6, patches 10 vulnerabilities
Mozilla today released Firefox 6, the second edition since it shifted to a rapid-ship cycle that delivers a new version of the browser every six weeks. Read More

The Real Name mystery
Sarah Caudwell (pseudonym of Sarah Cockburn, 1939-2000) was a British barrister and writer of detective stories. Sadly, she only finished four novels before her untimely death. Reviews of her work uniformly use words such as witty, delightful, clever, diverting, etc. I happened to be rereading her first ("Thus was Adonis Murdered") while writing last week's newsletters and was struck by a good analogy for the "Real Names" (see "Google+: antisocial networking?") issue. Read More

UK says Google needs further privacy improvements
Google was praised on Tuesday by the U.K.'s data protection watchdog for strengthening its privacy policies but the agency said the company still needs to improve. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Tips and tricks for protecting Android devices
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy, and data.

MOST-READ STORIES

  1. Mozilla ships Firefox 6, patches 10 vulnerabilities
  2. Outsourced and fired, IT workers fight back
  3. 10 scariest hacks from Black Hat and Defcon
  4. Fired techie created virtual chaos at pharma company
  5. World gone mad: Microsoft security praised again?
  6. FBI warns of growing car-buying cyberscams
  7. Sorry Angry Birds, texting still the most popular smartphone app
  8. Early OpenFlow user details 'exciting' benefits
  9. Brace for email-attachment malware spree
  10. Ten most ridiculous tech lawsuits of the 21st century

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: