Wednesday, June 16, 2010

Dell says Ubuntu is safer than Windows

  Cloud security in the real world: 4 examples | Enough blame to go around in iPad security breach
 
  Network World Security

Forward this to a Friend >>>


Dell says Ubuntu is safer than Windows
Linux has a powerful booster in the never-ending debate over what OS is safest from malware and spyware: Dell. Read More


WHITE PAPER: Aerohive

Comparing 802.11n Technologies
Wireless LAN users have access to speed in excess of 100Mbps. Learn how the different technologies compare in terms of maximum data rate and TCP throughput and find out how an 802.11n upgrade can have minimal impact on the existing network and not require a costly switch upgrade. Read more!

RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

Cloud security in the real world: 4 examples
We laid out the essential concepts of cloud security in Cloud security: The basics. Read More

Enough blame to go around in iPad security breach
The leader of a security research firm and AT&T traded angry words Monday in the wake of last week's data breach that exposed the e-mail addresses of 114,000 iPad 3G users. The carrier called the behavior of Goatse Security "malicious," while the security firm countered that AT&T was "being dishonest about the potential for harm." But both sides have plenty to answer for in how they've handled this security situation. Read More

Election hacking
Voting is a sacred right and an awesome responsibility. My Greek heritage makes me proud of the origin of voting, while my American citizenship makes me a beneficiary of its strongest instantiation. As a security expert, I am deeply suspicious of electronic voting machines, especially those that do not have auditable logs. So it is no surprise to me that the rush to adopt paperless, non-auditable electronic voting machines has subverted trust in the process and outcome of elections. The most recent example comes from the South Carolina primary. Read More


WHITE PAPER: Cisco Ironport Systems

Learn the 3 Best Practices for Securing E-mail
Any IT manager will tell you it's critical to protect data. With information flowing freely today via mobile devices, collaboration technologies and unified communications, it isn't easy. Learn data leak prevention (DLP) triage and the steps to protect proprietary data in e-mail, while also complying with government and industry regulations. Read now!

Microsoft offers security guidance for Azure cloud
The company urges developers to build apps with security in mind from the start Read More

Put your 'crapplications' into the cloud, experts suggest
Cloud Leadership Forum speakers opine on which applications are best for the cloud. Read More

Cloud security: The basics
Cloud computing is one of the most-discussed topics among IT professionals today. And not too long into any conversation about the most highly touted cloud models--software as a service (SaaS), infrastructure as a service (IaaS) or platform as a service (PaaS)--the talk often turns to cloud security. Read More


WEBCAST: AccelOps

Why Private Clouds May Prevail
Join Yankee Group for this Webcast that discusses how to ensure you deploy a cloud that meets your organization's security and compliance needs. Yankee Group provides advice on requirements for internal cloud readiness, identifying key controls, and properly assessing IT management tools within the cloud context. View now!

Hackers exploit Windows XP zero-day, Microsoft confirms
Hackers are now exploiting the zero-day Windows vulnerability that a Google engineer took public last week, Microsoft confirmed today. Read More

Sophos: Facebook failing to tackle likejacking
More than four in five (95 percent) of web users believe Facebook isn't doing enough to protect social networkers against 'likejacking attacks', says Sophos. Read More

Code Security: SAFECode report highlights best practices
A new report from the Software Assurance Forum for Excellence in Code (SAFECode) sheds new light on how vendors are trying to work more secure coding into the product development process. Read More

Facebook poses mobile working 'security threat'
Remote staff using Facebook are seen as the biggest security and productivity threat to mobile working, according to research. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

A brief history of smartphones
How the smartphone went from a high-end enterprise device to an everyday consumer staple.

Summer gadget guide 2010
From a solar-powered watch to a speaker for your bike helmet and a nifty geocache finder, these 10 high-tech toys are perfect for summer.

MOST-READ STORIES

  1. BP, in crisis mode, misses social networking target
  2. Apple's iPhone 4: A pre-order guide
  3. Google, Microsoft online apps both fail over privacy
  4. Linux trojan raises malware concerns
  5. Rogue Facebook app touts 'Teacher nearly killing a 13-year-old boy'
  6. Online porn users take huge risks, study finds
  7. How to get into medal of honor beta
  8. Twitter adds location to messages
  9. Safari 5 in depth: Has it sped past Chrome?
  10. Vodafone reveals iPhone 4 handset price

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment