Search This Blog

Friday, February 10, 2012

Network World Compliance Alert

FBI declares cloud vendors must meet CJIS security rules | 25 techie Valentine's Day gift ideas

Network World Compliance

Forward this to a Friend >>>


Hot authentication tools
Read More


WHITE PAPER: Internap

New eBook: Choosing a Green Colocation Provider
As the world's appetite for apps increases, so does the demand for processing power and the energy to fuel it. Is your colocation provider truly addressing this growing need with sensitivity to the environment? Learn More

In this Issue


WEBCAST: Silver Peak Systems, Inc.

WAN Optimization: Why go Virtual?
In this 3-minute video, you'll learn from CEO Rick Tinsley about Silver Peak's portfolio of virtual WAN Op solutions – from the high end VRX with 20X the capacity of any other virtual appliance to the self-service free downloads on the VX-Xpress Marketplace. Bonus footage includes real world results from two customers. Learn more.

FBI declares cloud vendors must meet CJIS security rules
The FBI Tuesday reaffirmed its rule that all cloud products sold to to U.S. law enforcement agencies must comply with the FBI's Criminal Justice Information Systems security requirements. Read More

25 techie Valentine's Day gift ideas
From subtle geekery to blatantly techie devices, Valentine's Day gifts suit a range of personalities Read More

FAQ about the VeriSign data breaches
A VeriSign filing with the Securities and Exchange Commission reveals that the company suffered more than one data breach in 2010, raising questions about how secure the company's products are and what customers should do about it. Read More

Researchers crack satellite encryption
Researchers at a university in Bochum, Germany claim to have cracked encryption algorithms of the European Telecommunications Standards Institute (ETSI) that are used to secure certain civilian satellite phone communications. Read More


WHITE PAPER: NetIQ

First Industy-Wide BSM Maturity Benchmark Study
This first-of-its-kind benchmark study reporting the IT and Business maturity illustrating the business service management imperative today. The survey offers insight into the current and future state of the Business Service Management imperative across global organizations. Learn More

Mobile device management: Apple's extra little tricky requirement
Anyone wanting to buy mobile-device management (MDM) software to manage Apple iOS devices will find they need a special digital certificate from Apple to activate it, a requirement that doesn't apply to the same MDM software that would be used to manage Google Android devices, for instance. Read More

Two SOPA post-mortems: one dead-on, one brain-dead
Most of you have probably had your fill of SOPA commentary, just as most of us here in New England would just as soon not hear another word about the Super Bowl. However, the issue of online piracy and what the government can do about it isn't going away, so I will point you to a pair of columns that are worth reading, one for its bringing clarity to the issue and the other for bringing utter nonsense.... Read More

Symantec verifies stolen source code posted by Anonymous is "legitimate"
Symantec is in an ongoing fight against hackers in the group Anonymous that last January attempted to extort a payment of around $50,000 from Symantec in exchange for not publicly posting stolen Symantec source code they had stolen for various older Symantec security products dating to 2006. Read More

Something fishy about Google Chrome's Safe Browsing API, lab says
A research firm that measures the security effectiveness of browsers noticed something it thought might be fishy with the way Chrome was doing things. Turns out, there may currently be a privacy concern about Google's use of end user IP addresses as part of its Safe Browsing API. Read More


WHITE PAPER: Cyrus One

Consolidating Data Center Support
This paper explores issues that arise when an enterprise that leverages collocated data-center support requires substantial growth in information technology infrastructure. Learn More!

Trustwave admits issuing man-in-the-middle digital certificate, Mozilla debates punishment
Digital Certificate Authority (CA) Trustwave revealed that it has issued a digital certificate that enabled an unnamed private company to spy on SSL-protected connections within its corporate network, an action that prompted the Mozilla community to debate whether the CA's root certificate should be removed from Firefox. Read More

Free Web tool consolidates data on code vulnerabilities
Enterprise coders can now use an open source Web application that lets them consolidate software vulnerability data from a range of scanning and test tools. With a centralized view, and reporting and management tools, ThreadFix speeds the work needed to fix software bugs and vulnerabilities, including those in proliferating mobile apps. Read More

DDoS attacks motivated by politics not criminality, Arbor Networks finds
Large Internet organisations believe ideological and political motivations have become the single commonest motivation behind the DDoS attacks hitting their networks, a survey of major Internet firms by has found. Read More

EPIC sues FTC over Google's planned privacy changes
The Electronic Privacy Information Center has filed a lawsuit against the U.S. Federal Trade Commission, asking a court to force the agency to take action against Google over planned changes in the company's collection of personal data. Read More

FTC warns background screening mobile apps may be unlawful
The Federal Trade Commission this week said it sent letters to six unidentified mobile applications makers warning them that their background screening apps may be violating federal statutes. Read More

Armored-truck company entrusts tracking software to Windows Azure cloud
U.K.-based cash-transport firm G4S is trusting the security of Microsoft's Windows Azure cloud service to keep safe the application that tracks where the money is as it travels to and from customers and the company's vaults in armored trucks. Read More



SLIDESHOWS

Hot authentication tools
User name and password doesn't cut it anymore in the world of online financial transactions. New federal rules call for multi-factor authentication schemes to combat growing threats. The latest multi-factor measures focus on biometrics, advanced analytics, and out-of-band techniques utilizing smartphones.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 rumor rollup for the week of Feb. 7
  2. Four crazy tech ideas from Google's Solve for X project
  3. 25 techie Valentine's Day gift ideas
  4. Security researchers: 'Did Google pull a fast one on Firefox and Safari users?'
  5. Anonymity bites Anonymous in attempt to extort Symantec
  6. Researchers crack satellite encryption
  7. iPhone 5 release set for summer 2012 -- report
  8. The When, Where and How of Cisco vs. Microsoft for Unified Communications
  9. Swedish e-commerce startup's execs charged in NYC sex crime
  10. Windows 8 strives for optimal battery life

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: