Search This Blog

Monday, March 05, 2012

Giving up your iPhone

RSA Conference 2012: Gauging the future for Microsoft's privacy, security initiatives | NASA squandering technology commercialization opportunities

Network World Voices of Networking

Forward this to a Friend >>>


Giving up your iPhone
Now you know that your cellphone is causing real harm what will you do? Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant on-demand remote support with LogMeIn Rescue
Without pre-installed software, quickly connect to PCs, Macs, smartphones and tablets anywhere in the world. Get in, solve the problem, and be done in a flash. Plus, Rescue's SaaS-based platform means free upgrades and zero maintenance. Try it free today.

RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
Companies like Foursquare, StrongMail, and ExoIS are taking charge of cloud server security using Halo from CloudPassage, which ensures easy, scalable, and automated security for dynamic cloud environments. Register today to Secure 25 Cloud Servers for Free with Halo Basic.

RSA Conference 2012: Gauging the future for Microsoft's privacy, security initiatives
At a time when the technology world is facing a fundamental shift in security practices, Microsoft is saying all the right things. Now, with the credibility of a decade's worth of work under its belt, Microsoft is at an opportune position to either bring its work to a new level, or let it slip in pursuit of other objectives. Read More


WHITE PAPER: HP, Microsoft & Intel

Fast Track your Access to Business Intelligence
Identifying the right configuration and deploying complete, scalable data warehouses can be a time consuming, costly and error-prone process. Success ultimately depends on the ability to deploy a system that can support an expected level of performance — then allow that performance to scale linearly as needed. Learn more

NASA squandering technology commercialization opportunities
The commercialization of all manner of space technologies has always been a forte of NASA, but the space agency faces a number of economic and internal challenges if that success is to continue. Read More


WHITE PAPER: Tripwire

Security-In-Depth Using Integrated Risk-Conscious Controls
Today's attacks on IT infrastructure are becoming more frequent, targeted and sophisticated. They range from well-funded, state-sponsored attacks to attacks from trusted employees and consultants. Learn More!

Open Source SEIM for the SMB
Out here at the RSA Conference in San Francisco. From the show this year you would have to assume that the economy is booming. Certainly it seems the security industry is booming. The show floor is packed with attendees. The expo spaces were sold out early. The meeting rooms are full. Most of all, the parties thrown by security vendors are more plentiful and extravagant than ever before. Read More

Smile for the drone: Coming to police stations near you soon
In 90 short days and counting down, it will be smile for the camera flying overhead, American citizens. Perhaps you should buy a baseball cap now to help in hiding your features from eye in the sky drones before buying a hat also becomes another ridiculous "suspicious" potential terrorist activity for SAR databases? Is that taking it too far when drones are capable of almost constant surveillance?... Read More

Such a tease: MWC exhibitors give video sneak peeks
A few smartphone and other device vendors have begun teasing what presumably will be products shown at Mobile World Congress (MWC), the big wireless industry event that kicks off next week in Barcelona (Network World's John Cox will be there reporting for us). Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Destroy digital evidence before it destroys you
  2. Top 25 iPhone & iPad apps for business
  3. How to catch an Internet cyber thief
  4. Hands-on with Windows Server 8 beta
  5. Windows 8 review: 'Mission accomplished', 'transcendent', 'unintuitive'
  6. How to protect your online privacy
  7. Windows 8: What you need to get started
  8. AT&T ups "unlimited" 3G throttling cap to 3GB
  9. Juniper targeting 7 key market segments
  10. Mozilla's 'modest proposal': Dump the smartphone OS

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: