Monday, January 11, 2010

Will Burton Group be lost in the M&A shuffle?

Oracle critical patch update includes 24 fixes | L.A. Apple Store shoppers targeted by thieves

Security: Identity Management Alert

Forward this to a Friend >>>


Will Burton Group be lost in the M&A shuffle?
I ended the last issue by promising more predictions for this one. And I intended to look at merger and acquisition predictions today. But events have caught up with us -- the first major acquisition of 2010 is already upon us. In fact, agreement was reached on Dec. 30, but only announced last week. So we'll consider Gartner's purchase of the Burton Group to be the lead-off merger and acquistion activity for the year. Read More


SPONSOR: WatchGuard

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

SPONSOR: Trend Micro

IDC: Smarter Protection For the Enterprise
Read this IDC paper for background on today's threat ecosystem with an overview of network security threats, the impact of the threats on enterprises, and the operational challenges faced by IT. Learn more.

Oracle critical patch update includes 24 fixes
Oracle on Tuesday will release a patch update that includes 24 security fixes for its database, application server and other products. Read More

L.A. Apple Store shoppers targeted by thieves
The L.A. Times Blog reports about an ongoing series of thefts targeting more than 100 Los Angeles-area Apple Store customers. Read More


SPONSOR: Quest Software

Linux and Unix in Your Environment? Don't Leave Security to Chance
Most businesses today rely on the stability and power of Linux or Unix in their data centers. However, these venerable platforms also create some compliance and security challenges.In this white paper, you'll learn to get the most from your Linux or Unix environment, while ensuring your data is safe and secure. Learn More

SpamAssassin '2010' bug blocked email across world
If you sent an email in the first few hours of 2010, there is a chance that it never reached its recipient thanks to an embarrassing '2010' bug buried in the open source SpamAssassin anti-spam engine used by many Internet Service Providers. Read More

Large-scale attacks exploit unpatched PDF bug
Hackers are exploiting a bug in Adobe's PDF software with both target and large-scale attacks a week before a patch is slated to be released. Read More


SPONSOR: Dell

Golden Rules: Here's How To Buy That First Server
Independent experts have made the decision of whom to buy from an easy one. According to IDC, Dell has led the small and medium-sized business (SMB) category for PC and laptop supplies in the U.S. for 10 consecutive years. Read More

Mac security reality check: mobile tech
Portable technology--laptops and iPhones particularly--come with their own special security risks. They can be lost, for starters. And iPhones can be made especially vulnerable if you jailbreak them. Here are some tips for keeping your mobile technology--and you--safe. Read More

The Low-down on Low-level Rootkits
Rootkits, a type of stealth technology used by malware malefactors, attempt to hide in the dark corners of an infected PC and evade detection. A new post out today from the Microsoft Malware Protection Center shines the spotlight on the evil tools. Read More



Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Cisco buys Rohati Systems; On Microsoft Subnet: Charting out prices for Office 2010; On Google Subnet: Google plans free white spaces database.

Network World on Twitter? You bet we are

Ethernet everywhere Decade in tech
Here is a quiz on the most important or quirkiest tech stories to hit the front pages over the first 10 years of the 2000s.




Windows 7Cool Yule Tools
Best picks from this year and a look back at 10 years of tech toys and gadgety gifts.




MOST-READ STORIES

  1. Amazon to customer: $3B charge may stand as record
  2. Google Nexus One vs. Apple iPhone 3GS
  3. 10 obsolete technologies to kill in 2010
  4. Microsoft won't fix Windows 7 crash bug next week
  5. Large-scale attacks exploit unpatched PDF bug
  6. Google Nexus One vs. Top 10 phone security requirements
  7. Juniper patches router-crashing bug
  8. 2020 vision: Why you won't recognize the 'Net in 10 years
  9. Y2K all over again in 2010?
  10. CES Preview: Gadgets for the year ahead

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments:

Post a Comment