Search This Blog

Friday, January 30, 2015

10 tips to secure your iPhone

Super Bowl XLIX's techiest commercials | PCI DSS 3.0 went into effect Jan. 1. Are you in compliance?

Network World Compliance

10 tips to secure your iPhone
No more is it enough to think that securing your iPhone with a simple 4 digit PIN is adequate. Read More


WHITE PAPER: Attachmate

Why your existing solution might not be adequate
To meet the demands of today's business landscape, IT staffs must take steps to secure and integrate their information assets, while satisfying compliance mandates and optimizing corporate efficiency. This white paper presents managed file transfer (MFT) as a way to meet corporate information and data management requirements. Read More

In this Issue


WHITE PAPER: Riverbed Technology

Powering the Hybrid Enterprise
To better serve business demands for information everyone, enterprises must develop new strategies for optimizing multiple kinds of networks. View Now>>

Super Bowl XLIX's techiest commercials
T-Mobile, BMW, Coke and Bud Light get geeky. Read More

PCI DSS 3.0 went into effect Jan. 1. Are you in compliance?
There are many changes, and some companies may not realize they are now out of sync Read More

INSIDER
How TD Ameritrade's Chief Data Officer is driving change
Derek Strauss, Chief Data Officer, TD AmeritradeTo read this article in full or to leave a comment, please click here(Insider Story) Read More

New Chrome extension spots unencrypted tracking
TrackerSSL is aimed at alerting websites of insecure tracking via Twitter Read More


WEBCAST: Unisys

Retrofitting the IT Factory; From Builder to Broker
In this webcast, we'll put Forrester Research market observations into the context of real-world CIO experiences to help you navigate the new world of service management—from the changes and challenges to proven best practices. View now

EU air passenger database about to take flight, but critics want it grounded
The EC is reportedly working on a plan to implement a Passenger Name Record (PNR) system, although a previous attempt failed Read More

Canadian agency reported to be monitoring millions of downloads
The Communications Security Establishment tracks activity at more than 100 file-sharing sites, according to news reports Read More

New products of the week 01.26.2015
Our roundup of intriguing new products from companies such as Dell and Hitachi. Read More

Blackphone super-secure communications app had serious flaw
A vulnerability in the bundled encrypted messaging app would have allowed attackers to execute malicious code on the device Read More


WHITE PAPER: Worksoft, Inc.

Automate Testing of Key Business Processes
Adoption of automated business process validation solutions, designed to address quality challenges with SAP and other ERP applications, can help cut costs, reduce ERP project backlogs, speed test cycles, and drive business agility. This IDC report provides quantifiable and qualitative analysis of the benefits. Learn More

FTC calls on IoT vendors to protect privacy
The agency recommends a set of best practices, but critics fear the FTC will enforce them as regulations Read More

DEA cameras tracking hundreds of millions of car journeys across the US
The existence of the database was revealed in documents obtained under a Freedom of Information request Read More

Kim Dotcom ready to take on Skype with end-to-end encrypted video calling service
MegaChat opens up for public testing Read More

How to assess the security of SaaS applications
The seven goals a SaaS security review should address Read More

Only 8 percent of companies can track shadow IT
Only 8 percent of companies know the scope of shadow IT at their organizations, according to a new survey by the Cloud Security Alliance Read More

13 geeky SkyMall catalog treasures you can't live without!
You might want to act now given SkyMall's financial situation. Read More


SLIDESHOWS

Cooler than cubicles: 18 new designs for the office

Sit, stand, lean, curl up – today's commercial furniture designs let users choose how they want to work.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES

1. AWS launches WorkMail for the enterprise

2. FCC calls blocking of personal Wi-Fi hotspots "disturbing trend"

3. Our bullet-proof LAN failed. Here's what we learned

4. Peeping into 73,000 unsecured security cameras thanks to default passwords

5. Oracle is quietly becoming a cloud giant

6. Cisco brings Meraki to the enterprise

7. Rooting your Android device: A guide for the accident-prone

8. 8 free Wi-Fi stumbling and surveying tools

9. Review: Kdenlive, the Linux video editor I want to use

10. 9 Common Spanning Tree Mistakes


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: