Tuesday, August 02, 2011

Planes, cats & mosquitos: The power of metaphor

State on rigged lottery: It's not a bug, it's a feature | Windows XP is a Rootkit Spawning Pool

Network World Security Strategies

Forward this to a Friend >>>


Planes, cats & mosquitos: The power of metaphor
Everyone knows that one of the keys to getting projects planned and underway is to define each project's scope. Scoping a project, at minimum, is defining the project's purpose, stakeholders, and delivery date, and then determining the time, dollars, and resources needed to get the job done. Read More


WHITE PAPER: BMC

Workload Automation Challenges and Opportunities
This Executive Brief discusses IDC's perspective on how enterprise workload management requirements are changing and highlights the ways that workload automation solutions can address these emerging requirements. Learn More!

WHITE PAPER: CA Technologies

Exceptional Application Experience
To improve and ensure the performance and availability of business-critical web applications, organizations need to be able to see and understand the actual user experience. This paper examines the five essentials of application performance monitoring. Learn More

State on rigged lottery: It's not a bug, it's a feature
Play a Massachusetts state lottery game called Cash WinFall during the right time periods -- a few days every three months -- and with a hefty enough upfront investment - hundreds of thousands of dollars - and you are all but certain to come out a big winner. Read More

Windows XP is a Rootkit Spawning Pool
If you're still dragging your feet on moving to Windows 7, consider this: a report from the Czeck antivirus firm Avast notes that three in four PCs infected with rootkits are running Windows XP, and it's not because so many people use aging operating system. Read More

ACLU to Congress: Cancer of Gov't Secrecy Is Killing America
American democracy is beyond sick, in fact it's cancerous due to government secrecy cloaking the surveillance of American citizens. According to a new ACLU report, written by Mike German, a former FBI undercover agent, and Jay Stanley, "We are now living in an age of government secrecy run amok." Hiding behind secrecy is "undermining the constitutional checks and balances," making some of us wonder... Read More


WHITE PAPER: IBM

Next generation data integration from TDWI Research
In November 2010, TDWI sent an invitation via e-mail to the data management professionals in its database, asking them to complete an Internet-based survey. The resulting completed responses of 323 respondents form the core data sample for this report. Read Now

Cloud Security Fears Exaggerated, Says Federal CIO
Outgoing federal CIO Vivek Kundra believes that cloud security issues ave been used to discourage cloud adoption. That's not stopping the Department of Homeland Security. Read More

European security group issues warning on HTML5
The European Union's computer security agency is warning that standards under development as part of HTML5 are undergoing rewrites that may neglect important security issues. Read More

Apple patches iOS security certificate flaw for iPhones, iPads
The latest iOS update corrects a security flaw in how Apple's mobile OS handled security certificates. Without it, hackers can create their own certifcates, opening iPhone and iPad sessions to capture and decryption. Read More


WHITE PAPER: Quest Software

5 Tips for Effective Backup & Recovery
In this Quest white paper, discover proven techniques to maximize and secure your virtual investments. Learn to increase backup speed, maximize throughput, and minimize performance drains while reducing costs. Read the white paper today. Read More.

Anonymous suspect 'Topiary' charged over DDOS attacks
The 18-year-old teenager identified by police as the spokesman for the hacking groups Anonymous and Lulz Security was charged on Sunday with five offenses and expected to appear Monday in a London court. Read More

Who's stealing your data?
In a number of recent newsletters we've looked at spear-phishing and how it can make your employees, customers, clients and users into unwitting dupes of the crackers and malfeasants who are trying to steal the "family jewels" of your organization. Just ask the folks at RSA (who insist that they are the "security division" of EMC). Read More

Black Hat roundup: Let the electric-shock craziness begin
Ready to power on next week, the annual Black Hat Conference in Las Vegas promises to be the high-voltage event it has been in the past where security experts tear apart any naïve hope that there's really anything secure at all that was ever made by the high-tech industry. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. 10 technologies that will change the world in the next 10 years
  2. 'War texting' lets hackers unlock car doors via SMS
  3. iPhone 5 rumor roll-up for the week ending July 29
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. E-commerce sites based on open source code under attack
  6. Say what? GNU Emacs violate the GPL
  7. How to survive Black Hat and Defcon without getting hacked
  8. Black Hat roundup: Let the electric-shock craziness begin
  9. Happy SysAdmin Day. Are you feeling thankful?
  10. New cases suggest iPhone 5 will be thinner, wider and longer than iPhone 4

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment