Search This Blog

Monday, September 08, 2014

Encrypted data in the cloud? Be sure to control your own keys

5 Ways to Improve Your Social Media Campaigns | Should you buy enterprise applications from a startup?

Network World IT Best Practices

Encrypted data in the cloud? Be sure to control your own keys
Data encryption in the cloud is an absolute requirement these days. When you talk to your service providers about encryption, be sure to specify that you want to control your own keys. Read More


WHITE PAPER: Kaseya

Managing the Complexity of Today's Hybrid IT Environments
There are many factors driving the complexity of IT today, each making it harder for organizations to get their hands around IT. Read this whitepaper to learn how to address the 3 key factors driving change in IT today. Learn more!

WHITE PAPER: Xirrus/Cisco/Aerohive/Extreme Networks/Motorola

The 2014 Wi-Fi Challenge
The explosion of mobile devices shows no signs of letting up, especially with the Internet of Everything just over the horizon. Wi-Fi is the connection method of choice, which means networks need the best possible solution to meet this growing demand. Which Wi-Fi vendor has the right solution to meet the challenges of the mobile revolution? Learn more

5 Ways to Improve Your Social Media Campaigns
Over the past few years, those in charge of branding and communication for large companies have realized that social networking can be an effective marketing tool. Sure, there's still multi-million-dollar ad campaigns that run during football games and the print advertisements in major national magazines. However, at a more granular scale, it's often the individual tweets and connections with customers that can have the most impact. CIO.com asked social media experts to share their best tips for achieving social media success on sites such as Facebook, LinkedIn.com and Twitter.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: CradlePoint

Mitigating Security Risks at the Network's Edge
This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks. Learn More

Should you buy enterprise applications from a startup?
The idea of buying an enterprise application from a startup company might sound like anathema to a CIO. But Chris Laping, CIO of restaurant chain Red Robin, based in Greenwood Village, Colo., disagrees. He believes we're in the middle of a significant shift that favors startups -- moving from huge applications with extensive features to task-based activities, inspired by the apps running on mobile devices.ALSO ON NETWORK WORLD: Google Graveyard: Here\\'s what Google has killed so far in 2014 Mirco Mueller concurs. He is an IT architect for St. Gallen, Switzerland-based Helvetia Swiss Life Insurance Co., which -- having been founded in 1858 -- is about as far from a startup as possible. He recently chose a SaaS tool from an unnamed startup over what he calls "a much more powerful but much more complex alternative. Its list of features is shorter than the feature list of the big companies, but in terms of agility, flexibility, ease of use and adjustable business model, it beat" all of its competitors.To read this article in full or to leave a comment, please click here Read More


WEBCAST: IBM Corporation

See what Security, Reliability and Efficiency looks like
The new System x servers with Intel ® Xeon ® processors offer innovative technology, offer innovative technology with exclusive new advanced security features to provide enterprise class data protection. Learn More

Best of IFA: The eye-catching new gear you need to see, from dirt-cheap PCs to smartwatches galore
An IFA to rememberJust as CES in Las Vegas is all about glitzy dreams and hazy visions of prototypes that may never come to pass, the annual IFA trade show in Berlin is all about concrete reality. The devices announced at IFA will be on store shelves this holiday season. Period.And because IFA is the last major electronics conference before that oh-so-crucial holiday season, device makers typically reveal the last big surprises of the year at IFA, hoping to make a splash before shipping products out to store shelves.To read this article in full or to leave a comment, please click here Read More

What an Apple mobile payments system on iPhone 6 might look like
Speculation is soaring that Apple’s expected unveiling of iPhone 6 on Sept. 9 will also include some kind of mobile payments system, often dubbed “iWallet.” The basic idea is to let consumers use their iPhone in place of cash or physical credit, debit, and various kinds of prepaid cards. But what would that actually look like? How might Apple put that together in a way that is distinctively “Apple-like?” + Also on NetworkWorld: iPhone 6 rumor rollup for the week ending Aug. 30 | What Apple can do to improve the iPhone 6 display | Apple's iBeacon turns location sensing inside out +To read this article in full or to leave a comment, please click here Read More

Why hackers may be stealing your credit card numbers for years
While conducting a penetration test of a major Canadian retailer, Rob VandenBrink bought something from the store. He later found his own credit card number buried in its systems, a major worry.The retailer, which has hundreds of stores across Canada, otherwise had rock-solid security and was compliant with the security guidelines known as the Payment Card Industry’s Data Security Standards (PCI-DSS), said VandenBrink, a consultant with the IT services company Metafore.But a simple configuration error allowed him to gain remote access. From there, he found the retailer was vulnerable to the same problem that burned Target, Neiman Marcus, Michaels, UPS Store and others: card data stored in memory that is vulnerable to harvesting by malicious software.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

The new Microsoft under Satya Nadella

The Microsoft CEO has set new goals, taken some decisive actions, moved ahead with works already in progress and made Wall Street happy.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. UCLA, Cisco & more join forces to replace TCP/IP

2. Internet of Overwhelming Things

3. Reddit, Mozilla, Imgur and others in slowdown protest over net neutrality rules

4. Cisco retools UCS server line

5. Data shows Home Depot breach could be largest ever

6. What an Apple mobile payments system on iPhone 6 might look like

7. Bypassing hardware firewalls in 20 seconds

8. Munich reverses course, may ditch Linux for Microsoft

9. Google's plan for Chrome worries certificate authority vendors

10. Patch Tuesday: Internet Explorer needs critical patches, again


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: