Tuesday, January 17, 2012

Insecure Android a myth, Motorola exec says

Stratfor CEO's 'censorship' rhetoric all wrong | U.S. CIO Unveils Mobile Strategy for Federal Government

Network World Security

Forward this to a Friend >>>


Insecure Android a myth, Motorola exec says
It's a myth that Android isn't secure and is difficult for IT managers to control, contended a top Motorola Mobile executive in an interview at the Consumer Electronics Show. Read More


WHITE PAPER: VMware & NetApp

Drive IT Efficiency with a Private Cloud
Read this success story and find out how NetApp and VMware provided Magna International with a cost-efficient solution. Read Now!

WHITE PAPER: Bradford Networks

(BYOD) Unleashed in the Age of IT Consumerization
IT departments need to understand what devices are trying to connect to their networks, so they can provide convenient, secure access to those that are authorized, including personal iPads and smartphones. This white paper explains how IT departments can implement a practical and secure strategy and offer the convenience mobile devices provide. Read more

Stratfor CEO's 'censorship' rhetoric all wrong
No one who works for Stratfor has been arrested, jailed or executed. Nor have they been censored. Yet here's what Stratfor CEO George Friedman says in a YouTube video posted Tuesday in conjunction with the company's relaunch of its website following a series of December hacker attacks that compromised personal information, including unencrypted credit card numbers, of thousands of the private intelligence... Read More

U.S. CIO Unveils Mobile Strategy for Federal Government
Obama administration tech chief Steven VanRoekel looks to narrow mobile gap between feds and private sector, also cites consumerization of IT and the migration to the cloud as key areas. Read More


WHITE PAPER: Quantum

Big Data: Managing Explosive Growth
Are you experiencing a data explosion? The trend toward leveraging Big Data for competitive advantage helps IT professionals successfully meet business goals. Learn how to reliably manage, store and access vast amounts of archived data while protecting it and keeping costs low. View Now

The weirdest, wackiest and coolest sci/tech stories of 2011
This year we find horses helping to build the Internet, Apple having all the money in the world and way more wackiness Read More

Anonymous publishes Israeli SCADA log-in details
A member of the Anonymous hacktivist collective has published a list of Internet-facing Israeli SCADA (supervisory control and data acquisition) systems and alleged log-in details. Read More


WEBCAST: NetIQ

Disaster Recovery Planning and the Cloud
Find out how virtualization is the stepping stone to the cloud and how to leverage virtualization technologies today to reduce the cost and improve the performance of your disaster recovery plan. Learn More!

4 Google Social Search Tips for Control and Privacy
Google sparked controversy on Tuesday with the announcement of a major search update that includes content from its budding social network, the announcement posted on Google's blog, Google Fellow Amit Singhal says, "Search is still limited to a universe of webpages created publicly, mostly by people you've never met. Today, we're changing that by bringing your world, rich with people and information, into search." Read More

What does 2012 have in store for Anonymous?
Anonymous had a busy year in 2011 pushing its hacker-activist agenda on companies around the Web, to the point where just the sound of the hacker group's name can send shivers down the spine of many a CIO. Anonymous in 2011 took on everything from HB Gary to a Mexican cartel, from oil companies to banks, from NBC to a transportation site. The group has positioned itself as a kind of Internet-based Robin Hood; when it hacked banks, the group claimed it was helping "the 99%" by giving money from the banks back to the people who rightfully deserved it. What have companies learned from this year of terror? The most that can be said is that corporate security needs to be shored up. At a conference panel in August it was evident that instead of battening down the security hatches, some companies were looking to just lessen the economic impact of a hack on their site. Network World has assembled some of the key stories surrounding Anonymous, the reactions from enterprise IT and their advice for surviving an attack, in a special PDF report that is free with Insider registration. So take a peek and then register to receive this package of stories about hackers' doings last year and what can be done next. Download "Hacktivists vs. the World" today. [[link]] Read More

The Best of CES 2012: Gadgets galore
The giant Consumer Electronics Show 2012 is on display this week in Las Vegas, with its annual outpouring of electronic wonders. Here's our take on the best stuff this year, updated throughout the week of Jan. 9. Read More



SLIDESHOWS

CES 2012 ultrabooks and tablets
Ultrabooks! Ultrabooks! That's the official biggest buzzword for this year's Consumer Electronics Show in Las Vegas. Ultrabooks! In honor of these purportedly magical super-thin laptops, we've decided to make a compilation of some of the ultrabooks you'll see at CES next week. And for good measure, we've thrown in a tablet that will garner a lot of attention as well. Enjoy!

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. IPad 3 rumor rollup for the week ending Jan. 11
  2. IBM smashes Moore's Law, cuts bit size to 12 atoms
  3. Google Science Fair back for second year
  4. The best of CES 2012
  5. New era for Web site names begins Thursday
  6. Cisco sending enterprises to the cloud
  7. IPhone 5 rumor rollup for the week ending Dec. 31
  8. LTE explodes at CES
  9. IBM wins most patents for 19th straight year
  10. Google pleads for more unlicensed spectrum instead of more auctions

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment