Search This Blog

Tuesday, January 10, 2012

Cautious optimism: Details of Microsoft's first Patch Tuesday of 2012

Do you know your cyberthreats? | 2012 Outlook: The end of everything?

Network World Security

Forward this to a Friend >>>


Cautious optimism: Details of Microsoft's first Patch Tuesday of 2012
Read More


WHITE PAPER: CA Technologies

Application Performance Management: The End User is King
Managing enterprise IT is no simple task. However, when it comes to critical applications and capabilities that impact end users and influence business results, the need for visibility into and across IT systems is critical. Learn More

WHITE PAPER: Citrix

Ready for 2048-bit SSL? Not with F5.
The Iron Age is officially over. The Cloud Age is here. Don't let stronger security compromise performance. NetScaler gives your network a competitive edge with the industry best 2048-bit SSL transaction/sec performance. 2x faster SSL performance than F5. 50% lower SSL costs. Download the Citrix and Verisign White Paper and the NetScaler vs. F5 Performance Comparison now.

Do you know your cyberthreats?
The watchdogs at the Government Accountability Office this week issued a report that takes a look at what information, or guidance as they call it, is available to help government agencies and public sector companies bulk up their cybersecurity efforts. Read More

2012 Outlook: The end of everything?
Gibbs reviews last year's predictions and sees that the end could be nigh ... Read More


WHITE PAPER: NetSupport Inc

Reducing Hidden Operating Costs Through IT Asset Discovery
After reductions in headcount and procurements have been made, cost-cutting strategies are now turning to internal operations, and many IT decision makers are taking a closer look at indirect, or "soft," costs within these departments. Learn More

Anonymous, LulzSec, AntiSec, Etc.: A Brief History of Hacktivism
The hacktivist collective Anonymous began getting media attention in 2008 with its attacks on the Church of Scientology. Three years later, Anonymous and its many offshoots and associations, including LulzSec, AntiSec, TeamPoison and the Peoples Liberation Front, reached the pinnacle of their infamy with major attacks on powerful corporations and government agencies. Here, CIO.com presents in pictures an abridged (and admittedly U.S.-centric) timeline of hacktivist activity. Read More

A quick look at the creation of computer-language translation efforts -- 58 years ago this month
Hard to imagine but it has been 58 years since IBM and Georgetown University teamed up to run what they said was at the time the first English-to-Russian language computer translation program. Perhaps even more interesting is that the individual phrases they that were plugged into punch cards and run on the big IBM 701 mainframe in 1954, can now be typed into Google Translate on my smartphone and handled... Read More


WHITE PAPER: Splice Communications

Offloading Telecom Delivers a Big Payback for IT
Inaccurate invoices, complicated contracts, slow provisioning and poor support from Telecom carriers wastes time, money and resources. Learn the difference a custom data network solutions provider can deliver. Read Now!

Passwords aren't dead, though maybe yours should be
Despite all those "death to passwords" chants, some say it's still a solid form of authentication -- when users aren't being stupid about theirs. Read More

Google patches Chrome, beefs up malicious file blocking tech
Google last week patched Chrome 16 and improved the download warnings in the impending Chrome 17. Read More

Do you have a reasonable right to privacy while fishing in an ice shanty?
If you were brave enough to venture into the freezing winter weather and then hunkered down on a frozen lake, inside an ice fishing hut, would you expect to have a reasonable expectation of privacy? The legal answer so far is "no" at least not in Spring Lake, Illinois, where a strange warrantless search case occurred such as, previously, I had not pondered. Granted, this may not be very techy but it's... Read More



SLIDESHOWS

CES 2012 ultrabooks and tablets
Ultrabooks! Ultrabooks! That's the official biggest buzzword for this year's Consumer Electronics Show in Las Vegas. Ultrabooks! In honor of these purportedly magical super-thin laptops, we've decided to make a compilation of some of the ultrabooks you'll see at CES next week. And for good measure, we've thrown in a tablet that will garner a lot of attention as well. Enjoy!

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Will Microsoft's WiFi-NC set new network standard?
  2. IPhone 5 rumor rollup for the week ending Dec. 31
  3. CES: Gigabit Wi-Fi takes center stage
  4. Samsung plans smart TVs with face recognition, voice and gesture control
  5. 5 reasons Linux Mint is better than Ubuntu
  6. Cautious optimism: Details of Microsoft's first Patch Tuesday of 2012
  7. IPad 3 to sport HD camera on front, upgraded camera on back
  8. 9 hot technology startups to watch in 2012
  9. 30 years ago, a battered AT&T cried Uncle Sam
  10. Cisco cranks up Internet TV volume at CES

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: