Friday, October 23, 2009

U.S. Dept. of Education ties desktop encryption to employee ID cards; Gartner on cloud security: 'Our nightmare scenario is here now'

Gartner on cloud security: 'Our nightmare scenario is here now'; IBM facing double legal trouble
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Netcordia
rule

The Importance of PCI DSS Compliance
The greatest challenge to PCI DSS compliance resides in monitoring and managing all its specific network requirements, which encompass security firewalls, access and change controls, system updates, configuration changes and testing procedures. Learn how to ensure that your organization achieves and maintains compliance.

Learn more

rule

Spotlight Story
U.S. Dept. of Education ties desktop encryption to employee ID cards

The Department of Education's desktop encryption rollout links the cryptographic process to employees' government-issued smart cards. Read full story

Related News:

Gartner on cloud security: 'Our nightmare scenario is here now'
Virtualization and cloud computing shaking up the old order, and the customary control is slipping away from security managers as the revolution unfolds.

IBM facing double legal trouble
IBM's lawyers have a busy winter ahead of them as Big Blue attempts to fight off antitrust accusations related to its mainframe business and an IBM employee faces allegations of insider trading.

Network World's Products of the Week Slideshow
Our round-up of intriguing new products from Sophos, McAfee, HP among others.

Sidekick Users Get Their Data Back, But Lawsuits Loom
Although Microsoft has now promised that all Sidekick users will be getting their contact info and other personal data back again, the furor felt over the past few days could show lasting impact.

Privacy advocate has ally in Social Security numbers fight
A fight to stop a Virginia privacy advocate from republishing on her Web site Social Security numbers obtained legally from public records on government sites is attracting the attention of some privacy heavyweights.

Report: Employee Holiday Shopping Will Strain Security
Despite a lagging economy, many workers will shop online while at work this coming holiday season, according to a survey conducted on behalf of ISACA, a nonprofit association of information technology (IT) professionals. The second annual "Shopping on the Job: Online Holiday Shopping and Workplace Internet Safety" survey found that fully half of those surveyed plan to use their company's computer to shop, putting a strain on employers' systems and potentially compromising an organizations sensitive information and security.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

IDC: Optimizing Storage to Reduce Data Footprint and Lower Costs
Read this review on today's storage optimization and technologies. Learn how they reduce the data footprint and identify how various technologies work toward this goal.
Learn more


Total Cost Comparison: IT Decision-Maker Perspectives
Review research done by Oliver Wyman to determine the total cost of acquiring, deploying, operating, and managing storage environments from various vendors to support VMware server virtualization solutions.
Click here to learn more.

 

October 23, 2009

MOST-READ STORIES

  1. Goodbye steering wheel, here comes drive-by-joystick
  2. 10 people you won't see at Microsoft's Windows 7 launch party
  3. Microsoft, Dell, Spectrum Bridge launch first public white spaces network
  4. Gartner on cloud security: "Our nightmare scenario is here now"
  5. Geek pranks: 15 high-tech tricks to haunt your co-workers
  6. IT pay cuts: Are you next?
  7. IBM takes aim at Windows 7 with new desktop offering
  8. Windows 7 more popular than Harry Potter
  9. The top 7 roadkill victims on the journey to Windows 7
  10. Security hole turned 64,000 Time Warner cable modems into hacker prey

Improving Application Performance Troubleshooting
Dramatically reduce downtime with the right tools. This whitepaper explains the four key features your application performance management toolset should include. Look for automation, intuitive analysis, real-time support and proactive problem solving.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment