Tuesday, December 15, 2009

Traveling to dictatorships

Mac Security in 2010; Adobe Flash's security woes: How to protect yourself
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by WatchGuard
rule

When Pressing Send Results In Compliance Issues
Protecting confidential data is serious business. Failure may result in fat fines and even jail time – not to mention brand damage. But take heart. WatchGuard easy-to-use, all-inclusive email and web secure content and threat prevention appliances provide complete data protection. This white paper offers a new perspective on bringing depth and breadth to your compliance strategy.

Learn More Now

rule

Spotlight Story
Traveling to dictatorships

In 1994, I was asked to lead a delegation of information security experts from the United States and the People's Republic of China. When not on the West Coast, and in our preparatory briefing, I warned the members of our delegation to be on their guard at all times once they entered the PRC. Read full story

Related News:

Mac Security in 2010
In May of this year, I wrote a blog on another media site predicting a precipitous rise in Mac-based malware. At the time, I believed that this would change Apple's public claims about security superiority over Windows and force Steve Jobs and company to recommend security software for all Mac users. I guess this blog got some people's attention. Usually my blogs would get a half-dozen comments...

Adobe Flash's security woes: How to protect yourself
Experts disagree whether Adobe's security is 'immature' or Flash's popularity makes it a hackers' target

Facebook and Google: Contrasts in Privacy
The headlines recently have been dominated with news of online privacy. Facebook has implemented changes that affect the privacy of status updates, and Google made headlines for its apparent disregard for privacy.

Lawmakers seek to stop reposting of TSA security document
Several lawmakers are asking DHS Secretary Janet Napolitano to examine if any legal remedies are available to stop Web sites from reposting a recently leaked TSA security manual.

NASA needs to free Mars rover before it freezes to death
NASA's Mars rover Spirit now apparently has two broken power wheels and the space agency's scientists face the unenviable task of trying to get the stuck spacecraft out of the mud before Martian winter freezes sets in.

FBI: Rogue antivirus scammers have made $150M
They're the scourge of the Internet right now and the U.S. Federal Bureau of Investigation says they've also raked in more than US$150 million for scammers. Security experts call them rogue antivirus programs.

Chinese Zodiac Accurately Predicts Yearly Cybercrime Trends
Could it be possible that the Chinese Calendar has been successfully predicting the trends and methods of security activity in a given year? Could the Chinese Zodiac be used to predict the security future like the Farmers Almanac predicts the weather? We are about to close out 2009 the year of the Earthy Ox as defined by the Chinese calendar.

Today from the Subnet communities

On Cisco Subnet: Annual revenue for Cisco TelePresence and Cisco's EMC/VMware collaboration viewed favorably; On Microsoft Subnet: Power outages cause Windows Server 2008 problems; On Google Subnet: Google claims its new URL shortening service is more secure

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Secure in 15 - Start with Daily Practices
Get the Secure in 15 toolkit starting with the "15 Minutes Month-at-a-Glance" calendar. McAfee will send you additional tools and tricks to stay protected around the clock.
Click here to learn more.


The Four Trends Driving the Data Center Future
Does efficiency have to come at the expense of availability? Not according to this paper, which outlines the four data center infrastructure trends that are reducing design, operating and management costs while improving data center performance. Those trends are Infrastructure Management, Eco Availability, Flex Capacity and High Density.
Learn more.

 

December 15, 2009

MOST-READ STORIES

  1. Google releases experimental phone to employees
  2. 10 top iPhone apps for IT pros
  3. Watch out Microsoft: GNOME is poised to have a killer 2010
  4. After criticism, Facebook tweaks friends list options
  5. Microsoft buys Opalis to strengthen cloud management
  6. 8 more PowerPoint train wrecks
  7. Eric Schmidt's privacy policy is one scary philosophy
  8. Tech mergers and acquisitions to grow in 2010
  9. Amazon's data center outage reads like a thriller
  10. Nortel purchase to test Avaya big time

Why Small Companies Should Think Outside Box for Protecting Endpoints
In their "Sector Insight" study, Aberdeen Group investigated the considerations small business should take when selecting anti-malware solutions. Read this paper to learn why Aberdeen recommends small enterprises be open to endpoint security solutions from vendors other than McAfee and Symantec.
Read Now



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment