Search This Blog

Friday, January 13, 2012

Google Search Strips Privacy from 'Your World'

IBM software eases role-based security operations | Is insourcing the new outsourcing?

Network World Security

Forward this to a Friend >>>


Google Search Strips Privacy from 'Your World'
If you signed into your Google account, then you noticed that Google stripped privacy from your digital world. This 'personal' search results change is neither privacy by design, nor by default. Even 'opting-out' per Google signed-in session will not stop others from seeing your data in their Google search results. You are automatically opted-in since there's no privacy setting to exclude your 'social'... Read More


WEBCAST: ForeScout Technologies

Experts Help CIOs Rethink Threat Prevention
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

WHITE PAPER: VMware & NetApp

Drive IT Efficiency with a Private Cloud
Read this success story and find out how NetApp and VMware provided Magna International with a cost-efficient solution. Read Now!

IBM software eases role-based security operations
IBM this week announced an identity-management analytics tool that eases what can be a tedious job for information-technology managers -- defining roles for employees in order to establish policy-based access to a network and application resources. Read More

Is insourcing the new outsourcing?
It would be a stretch to insinuate that outsourcing of all manner of work outside the US is subsiding substantially. Read More

How a Baptist pastor in Florida became the go-to IT guy
As a Baptist pastor, Terrill Gilley says his work calls for him to help worshippers and provide support to the senior pastor at his Florida church located in a rural area outside Orlando. And oh, he's also the network administrator for the church and the school it established. Read More


WEBCAST: Aerohive

The Cloud's Impact on Branch Office Networking
Gartner Vice President & Distinguished Analyst Mark Fabbi explains how cloud-enabled networking allows full functionality in the branch, enterprise-grade visibility and control in real-time, with the ability to provide automated remediation and security to even the most remote branch or teleworker. View Now

Hash collision DoS vulnerability fixed in PHP 5.3.9
The PHP development team has released version 5.3.9 of the popular Web development platform in order to address a recently disclosed denial-of-service (DoS) vulnerability, as well as other security issues and bugs. Read More

Sandia Labs touts DNSSEC tool
Sandia National Laboratories is touting a free Web-based visualization tool called DNSViz to help domain name registrars, government organizations and others rolling out DNS Security to better manage the technology that federal entities have been mandated to employ. DNSSEC for the .com domain was also enabled last year, with big registrars like GoDaddy.com jumping on board. Read More

Microsoft to launch real-time threat intelligence feed
Microsoft is looking to share its wealth of security information with the world through a new real-time threat intelligence feed, the company recently announced at the International Conference on Cyber Security in New York. Read More


WHITE PAPER: Bradford Networks

(BYOD) Unleashed in the Age of IT Consumerization
IT departments need to understand what devices are trying to connect to their networks, so they can provide convenient, secure access to those that are authorized, including personal iPads and smartphones. This white paper explains how IT departments can implement a practical and secure strategy and offer the convenience mobile devices provide. Read more

Managing information security during an innovation void
Although predictions for the coming year are a staple of the season, I will do more than offer an educated guess. I am going on the record with a guarantee: In 2012 we will see an increase in network intrusions from disparate parties trying to create IT infrastructure chaos for a variety of reasons primarily political, financial and economic. An easy prediction perhaps given the trend and yet while I fully trust CSOs and CISOs and security teams are doing all they can to prevent breaches; I am deeply concerned that they still lack the technology to adequately protect IT infrastructure from malicious attacks. Read More

5 Hot Technology Policy Agenda Items You Need to Watch
From providing more spectrum space for wireless providers to battling online piracy to creating cybersecurity policy to protecting intellectual property, expect things to heat up in Washington this year. So pour yourself a cup of coffee and read on to learn how lawmakers will impact the tech world in the year ahead. Read More

UPDATED: The Best of CES 2012
Smartphones, tablets, unique gadgets and yes, Ultrabooks make a splash at CES 2012 Read More

Symantec employs scareware sales tactics, lawsuit charges
A Washington man on Tuesday sued Symantec in federal court, accusing it of using the same tactics as fake "scareware" software to sell its PC cleanup utilities. Read More



SLIDESHOWS

CES 2012 ultrabooks and tablets
Ultrabooks! Ultrabooks! That's the official biggest buzzword for this year's Consumer Electronics Show in Las Vegas. Ultrabooks! In honor of these purportedly magical super-thin laptops, we've decided to make a compilation of some of the ultrabooks you'll see at CES next week. And for good measure, we've thrown in a tablet that will garner a lot of attention as well. Enjoy!

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. IBM wins most patents for 19th straight year
  2. New era for Web site names begins Thursday
  3. 4 sweet smartphones from CES 2012
  4. 5 reasons Linux Mint is better than Ubuntu
  5. The best of CES 2012
  6. Apple's HDTV and the challenge of subscription programming
  7. Microsoft's Steve Ballmer talks Windows 8
  8. Google search strips privacy from "Your World"
  9. IPhone 5 rumor rollup for the week ending Dec. 31
  10. Data center networking discontinuity

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: