Search This Blog

Thursday, May 06, 2010

Facebook vs. LinkedIn: Which has the better privacy?

Hand-helds fail at the NYSE today: Report | Pentagon bringing advanced math concepts to battlefield tactics

Network World Security

Forward this to a Friend >>>


Facebook vs. LinkedIn: Which has the better privacy?
Privacy advocates' criticism over recent moves by Facebook and Google Buzz begs the question: Is privacy possible in a social network? And, if so, which social-network service does it the best? To answer this question, this month I donned my privacy goggles and pored over the two social networks that my professional peers seem to use the most: Facebook and LinkedIn. I also asked all my Facebook friends and LinkedIn connections to tell me which they thought did privacy better. (I didn't look at Buzz because I admittedly don't know anyone using it.) What did I find out? Read More


ARTICLE: Sophos

FREE Threat Detection Test from Sophos
Scan your network for viruses, spyware, and other threats missed by your existing AV software. Is your AV catching everything? Click to continue

WHITE PAPER: Sophos

Best practices for implementing Windows 7
If you're planning to roll out Windows 7, now is the time to review your endpoint and data protection strategies to make sure that you're taking full advantage of the new security features as well as enhancing your overall security for enterprise deployments. Read Now.

Hand-helds fail at the NYSE today: Report
The Wall Street Journal reported that about 30% of hand-held devices used by brokers on the floor of the New York Stock Exchange randomly failed this morning. Read More

Pentagon bringing advanced math concepts to battlefield tactics
Military scientists at the  Defense Advanced Research Projects Agency over a year ago put out a call to get answers to what it called the world's 23 toughest math questions with the idea that major math breakthroughs could greatly enhance the country's security.  While it is unclear what  DARPA would do with the answers to those questions, the Pentagon today added to the search for mathematical... Read More

Huawei moves to convince India on network security issues
Huawei Technologies is taking measures to convince the Indian government that there are no security issues arising from Indian telecommunications operators buying its equipment, it said Wednesday. Read More


WHITE PAPER: Citrix Systems

Tolly Group Performance Report
Tolly Report: "Citrix NetScaler with nCore Outperforms F5 BIG-IP" shows you how Citrix NetScaler beat F5 in head-to-head tests - providing 3X faster Web traffic, lower latency and higher throughput. Learn More!

FedRAMP Seeks to Unify Cloud Computing Security Standards Across the U.S. Government
Yesterday, I hosted a panel at the Cloud Computing summit focused on cloud security for the federal government. The panel was made up of some smart folks: Alex Hart from VMware, Bob Wambach from EMC and one of the primary authors of the Cloud Security Alliance guidelines, Chris Hoff from Cisco. Read More

10 hot energy projects that could electrify the world
There are thousands of projects underway to change the way the U.S. and the world produces and uses energy. Start-ups are looking to harness the world's ocean waves and build advanced fuel cell that produce data center-class electricity. Read More

Co-op Bank offers anti-fraud technology service
The Co-operative Bank has partnered with identity management firm GB Group to supply anti-fraud technologies to local authorities and other public sector organisations. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

U.S. Treasury Web sites hacked, serving malware
Three Web sites belonging to the U.S. Department of the Treasury have been hacked to attack visitors with malicious software, security vendor AVG says. Read More

Agencies struggle to meet Obama's Open Government Directive
An audit of efforts by government agencies to meet the Obama administration's Open Government Directive found some agencies have created strong plans while others are having problems. Read More

Security truths get lost in the cloud
There was an awkward moment during the keynote address for The Experts Conference last week. Conrad Bayer, Microsoft's general manager for identity and access, was addressing the delegates of the Directory and Identity track and, while talking about enterprise and organization movement to cloud computing, put up a slide that compared the migration to the cloud of small, midsize and large organizations. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Geeky Weddings, Birthdays, and Funerals
If you've ever dreamed of marrying a video-game character, having your ashes put in a computer, or holding your wedding on the deck of Star Trek's USS Enterprise, you're not alone.

2010 'Geek and Tech' Summer Movie Preview
It's summer movie time again, time for the movie studios to trot out its blockbusters with explosions and all sorts of fun. Here's our picks for the favorite movies that techies and geeks (comic book fans, unite!) will be lining up for.

MOST-READ STORIES

  1. Report blames IT staff for school Webcam 'spying' mess
  2. Erasing your digital tracks on the Web
  3. Dear Apple: Please make 'magical' disappear from iPad pitches
  4. U.S. Treasury Web sites hacked, serving malware
  5. 5 reasons why Google Chrome will crush IE in browser war
  6. 5 things you didn't know you could do with Google Apps
  7. Who owns www.cloud.com anyway?
  8. Geeky weddings, birthdays and funerals
  9. Dissecting Microsoft Office 2010
  10. 5 technology security myths, busted

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: