Monday, September 28, 2009

A security evangelist shares his best practices

Russian cybergangs make the Web a dangerous place; Job Search Success: Planning and a Positive Attitude
Network World logo

IT Best Practices

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by EMC
rule

EMA: Successfully Managing your Next-Gen Data Center
How well are your virtual servers performing? Get them in tip-top shape with the best practices shared in this Live Webcast on Thursday, October 15, 2009 at 2 PM EST/11 AM PT. Join Jim Frey of Enterprise Management Associates as he discusses how to identify root cause issues, quickly spot performance bottlenecks, improve IT service delivery and much more.

Register today.

rule

Spotlight Story
A security evangelist shares his best practices

Anyone who has the word ¿evangelist¿ in his business title must really love his job. This week, John Linkous, Security and Compliance Evangelist at eIQnetworks shares his best practices for information security. Read full story

Related News:

Russian cybergangs make the Web a dangerous place
Russian cybergangs have established a robust system for promoting Web sites that sell fake antivirus software, pharmaceuticals and counterfeit luxury products, according to a new report from security vendor Sophos.

Job Search Success: Planning and a Positive Attitude
A University of Missouri study of 327 job seekers found that those who develop clear goals, implement plans for achieving them, and stay upbeat during their job search land more interviews and job offers than those job seekers who don't plan and aren't as positive.

What will tech's recovery look like: a U, V or W?
There was a lot of difficult news for the high-tech industry this year. But the damage, by some measures, wasn't as bad as it may have seemed, and new data suggest IT managers reduced hardware spending to save jobs.

Google's Gmail suffers another disruption
Just two days after Google News crashed, Google Inc.'s e-mail service, Gmail, suffered a disruption.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Best Practices for Selecting WAN Optimization Solutions
This white paper explains how to best make this critical technology decision. It provides an overview of best practices for defining requirements and comparing alternative solutions. Most important, it offers a metric – performance ROI – that IT organizations can use to select the WAN optimization solution that delivers the greatest business value.
Learn More


aCelera/IBM Rational ClearCase Evaluation:Global Telecommunications Company
Read this evaluation on the implementation of aCelera technology supporting a Telco's IBM ClearCase deployment of approximately 10,000 seats. Learn how it will produce a productivity benefit ranging from $1.18 million USD to $18.0 million USD in year 1 of production.
Learn more.

 

September 28, 2009

MOST-READ STORIES

  1. Microsoft "Courier" Tablet to compete against Apple Tablet
  2. Microsoft, researchers release new operating system project
  3. IE8 runs 10 times faster with Google plug-in
  4. Microsoft blasts Google over Chrome Frame plug-in
  5. Chambers' pay package climbs 16% while Cisco net income falls 23%
  6. How could iPhone MMS crash AT&T's network?
  7. MMS to go live on the iPhone tomorrow
  8. What to do about bandwidth hogs?
  9. FBI building system that blows away fingerprinting
  10. Seven advanced car technologies the government wants now

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment