Search This Blog

Tuesday, March 09, 2010

Pa. district accused of student spying puts IT workers on leave

US softens Internet export rules for Iran, Sudan and Cuba | Google sheds light on Chrome OS Netbook security

Network World Security Alert

Forward this to a Friend >>>


Pa. district accused of student spying puts IT workers on leave
Two IT employees of the suburban Philadelphia school district accused of spying on students by activating the cameras on their school-issued laptops have been placed on administrative leave. Read More


RESOURCE COMPLIMENTS OF: Sophos

FREE Data Leakage for Dummies Book from Sophos
You need to protect your company's most valuable asset – your data. Request a book today! Click to continue

E-GUIDE: Compuware

5 Tips for Getting the Best Web App Performance
This eBook, compiled by Network World, explores the pressing issues, from dealing with outages and evaluating performance monitoring services, to the impact of virtualization. Get expert tips to optimize your Web apps. Click to continue

US softens Internet export rules for Iran, Sudan and Cuba
Looking to facilitate what it calls free speech rights in countries that don't look favorably at such liberties, the US government today said it would ease the regulations around exporting Internet-based applications such as Read More

Google sheds light on Chrome OS Netbook security
Google's Chrome OS Netbook will feature a host of built-in security technologies designed to protect users from malware and other threats, a Google engineer said at the RSA Conference Thursday. Read More

Fatal System Error: A MUST read for IT professionals, legislators, and law enforcement
When I left home for the RSA Conference last Monday, I was already aware of the types of cyber threats we are up against. After speaking with security research leaders from Bluecoat, Symantec, and Trend at RSA, I am even more convinced that we are way behind the enemy and need to react quickly before we are completely overwhelmed. Since one way to drive action is increased cybersecurity visibility... Read More


WHITE PAPER: IBM NWW

Increasing Energy Efficiency with x86 Servers
According to the Robert Francis Group, power efficiency will be the number one issue for IT executives for the next decade, at least. Fortunately, the combination of IBM BladeCenter Systems with the new Intel® XeonĂ’ 5500 Series processors provide the best combination of value, performance, and reliability. Download the white paper to see how. Read More

The Energizer DUO Trojan: What You Need to Know
The Energizer Bunny keeps going and going, but he picked up a nasty Trojan along the way. The U.S. Department of Homeland Security discovered that Energizer's Duo USB charger left Windows computers open to remote control, thanks to a back door in the product's battery monitoring software. Here's what you need to know: Read More

Analysis: Does the storm over cloud security mean opportunity?
How to balance the cost savings of cloud computing with the loss of control over corporate data was a hot topic at this week's RSA Security Conference. Read More

Bracing for a cybersecurity Pearl Harbor
Some of the people who know best how serious the cybersecurity threat is say not enough is being done to prevent such attacks and lament that the only thing that will prompt any action is the cyber equivalent of Pearl Harbor."We've got to start talking about this," said Michael Chertoff, former secretary of the U.S. Department of Homeland Security, during a panel discussion on cybersecurity at RSA... Read More


WHITE PAPER: Tripwire

FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process. Click here.

Newest Security Reports Show Changing Threats
Over 9 months ago I posted a blog about the numerous annual security reports that are published by various organizations. However, in the rapidly-changing world of Internet security much has changed since then. New security reports have since been written and it is time to revisit these reports to see what different organizations are observing. I find it useful to seek out new perspectives on the... Read More

Researchers zap RSA algorithm; Medical ID theft on the rise
Three University of Michigan computer scientists say they have found a way to exploit a weakness in RSA security technology used to protect everything from media players to smartphones and e-commerce servers. Also, a new survey from the Ponemon Institute says identity thieves are increasingly going after medical information data and services. (4:50) Read More

Satyam still risky a year after fraud revealed: Forrester
Over a year after Indian outsourcer Satyam Computer Services reported a major financial fraud at the company, research firm Forrester still cautions customers doing business with it. Read More

IT Scurries to Meet E-health Records Deadline
Hospitals and doctors' offices looking to roll out electronic health records won't get federal money for the ambitious effort unless they meet certain as-yet unknown criteria -- and do so within two years. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Forrester Research and Network World want to hear from you!
We are collaborating to conduct an on-line-based study focused around data center strategy. The survey should take approximately 12 to 15 minutes to complete. This is both a confidential and anonymous survey and your results will only be used in aggregate. As a special thankyou, all respondents will receive a free copy of the resulting research report from Forrester – a $500 value! Thank you for taking the time to fill out the survey.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

7 most useful Firefox add-ons
Some "add-on apps" work well enough to replace a standalone desktop application. Here are seven add-ons that transform Firefox into a fully functioning application.

Fave raves: IT pros' favorite products
We asked readers about their favorite must-have network products and found there's a lot of love for products that can automate manual processes, improve visibility and management, and speed performance for end users. Products that save money are also, not surprisingly, big favorites.

MOST-READ STORIES

  1. Steve Jobs says "No" to iPhone tethering on the iPad
  2. Internet hit by wave of ransom malware
  3. Tech debate: Google Gmail vs. hosted Microsoft Exchange
  4. Windows Mobile apps won't work on new phones
  5. Microsoft delivers feature-rich SSP VPN
  6. The state of 4G in 2010
  7. Google sheds light on Chrome OS Netbook security
  8. Cisco exiting WiMAX RAN?
  9. Griping online: Call first, Tweet later
  10. The best of Google Buzz

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: