Thursday, October 15, 2009

Hiring hackers: A Rebuttal (part 1)

Facebook applications at risk from attack; What kind of cloud computing project would you build with $32 million?
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Alcatel-Lucent
rule

A New Approach to Enterprise Security
Is your business truly secure against today's sophisticated security threats? Securing communications for all voice and data applications as well as employee mobility is the key to supporting new business models that allows enterprise to compete effectively in today's business environment. Learn how security can become a positive enabler for your business.

Click here to continue

rule

Spotlight Story
Hiring hackers: A Rebuttal (part 1)

Reader (and Norwich University MSIA graduate) Paul O'Neil disagrees with my suggestions in the recent two-part article "Hiring Hackers" published in this column. He has written a thoughtful and constructive rebuttal which has made me think critically about my position even though I disagree with him; I hope his two-part analysis will stimulate further discussion. Everything that follows is O'Neil's work with minor edits. Read full story

Related News:

Facebook applications at risk from attack
A number of Facebook applications, including one called CityFireDepartment, has been hacked and tries to attack site visitors' computers via unpatched Adobe software vulnerabilities, a researcher says.

What kind of cloud computing project would you build with $32 million?
The US Department of Energy said today it will spend $32 million on a project that will deploy a large cloud computing test bed with thousands of Intel Nehalem CPU cores and explore commercial offerings from Amazon, Microsoft and Google.  

Twitter: Don't change your log-in data until further notice
Twitter users should refrain from changing their log-in data until further notice or else risk getting locked out of their accounts.

Computer programmers set for smash-mouth brain battle
A smart people smack-down is set to start next week where thousands of university computer researchers will pit their brains and machines in a grueling battle of logic, strategy, and mental endurance.

Bugs hit Google Docs after recent upgrade
Google Docs users are having problems printing, exporting and uploading certain files, the company acknowledged, as it is rolling out a set of upgrades to this hosted office productivity suite.

Federal gov't releases response to Privacy Act
The Federal Government has released its first response to a comprehensive review of Australia's privacy laws in the digital age.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More


Top to Bottom Performance Management Excellence at the City of Chicago
In this featured City of Chicago case study, learn how the City's performance management efforts leveraged BIRT Performance Scorecard to: Save $10 million by improving their management of Overtime through Performance Management, break down departmental silos by facilitating cross-communication and consolidating financial payment processes and unify the performance management efforts of 36 city departments. Attend this web seminar to receive a complimentary copy of the City of Chicago case study.
Click here to register today.

 

October 15, 2009

MOST-READ STORIES

  1. Missing dot drops Sweden off the Internet
  2. Google to send detailed information about hacked Web sites
  3. 802.11n price wars already underway
  4. IE, GDI flaws good place for IT to start Patch Tuesday cleanup
  5. Developer ups iPhone app to $40 after complaints about price
  6. Human race on the verge of a massive upgrade
  7. Cisco buying wireless wunderkind Starent
  8. Sidekick implosion: Was it sabotage?
  9. Microsoft delivers massive Patch Tuesday, fixes 34 flaws
  10. House decommissions last mainframe, saves $730k

3 Tips to Get Out of Firefighting Mode
Join Enterprise Management Associates (EMA) for this webcast on how to become more proactive with network and application management. EMA offers guidance on how to pick a pilot project to demonstrate immediate success as well as tips on how to lengthen MTBF and shorten MTTR.
Click here to get all the details now!



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment