Friday, June 18, 2010

Is the U.S. prepared for cyber war or are we sitting ducks?

  Supreme Court ruling lets employers view worker text messages with reason | Employee monitoring: When IT is asked to spy
 
  Network World Security

Forward this to a Friend >>>


Is the U.S. prepared for cyber war or are we sitting ducks?
Before I say anything at all, please eyeball this quote from 60 Minutes by Admiral Mike McConnell, previously chief of national intelligence who oversaw CIA, DIA, and NSA, regarding the cyber terrorism and the US electricity infrastructure: Read More


WHITE PAPER: Cisco Ironport Systems

Learn the 3 Best Practices for Securing E-mail
Any IT manager will tell you it's critical to protect data. With information flowing freely today via mobile devices, collaboration technologies and unified communications, it isn't easy. Learn data leak prevention (DLP) triage and the steps to protect proprietary data in e-mail, while also complying with government and industry regulations. Read now!

RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

Supreme Court ruling lets employers view worker text messages with reason
The U.S. Supreme Court has ruled that the Ontario, Calif., police department has the right to search through personal text messages sent by employees on city-issued devices. Read More

Employee monitoring: When IT is asked to spy
It's 9:00 in the morning, or 3:00 in the afternoon, or even 10:00 at night. Do you know what your users are up to? Read More

Can X Prize help deliver Gulf region from BP oil disaster?
The X Prize Foundation, known for offering millions of dollars in prize money to drive innovations in aerospace, life science and energy will soon offer its potentially extensive help to the White House in an effort to tackle challenges of the devastating BP Oil spill in the Gulf of Mexico. Read More


WHITE PAPER: Aerohive

Replace Controllers with Protocols
Learn how a controller-less approach to WLAN keeps costs linear and predictive regardless of network size or deployment type. This architecture provides the capital cost advantages of autonomous APs and the technical advantages of controller-based approaches. Learn more!

Banking's big dilemma: How to stop cyberheists via customer PCs
In online banking and payments, customers' PCs have become the Achilles' heel of the financial industry as cyber-crooks remotely take control of the computers to make unauthorized funds transfers, often to faraway places. Read More

iPad hacker arrested on multiple drug charges after FBI search
One of the hackers in the group that snatched more than 100,000 iPad owner e-mail addresses from AT&T's servers was arrested Tuesday on felony drug charges after the FBI searched his Arkansas home Read More

Advocacy Groups Ask Facebook for More Privacy Changes
Facebook recently made some significant changes to its privacy settings, but ten advocacy groups are want the social network to do more. The groups are asking for six additional privacy changes, ranging from providing a more secure user connection to the Facebook site, to giving you more control over how third-party apps access your data. Read More


WHITE PAPER: Aerohive

Deploying a Secure WLAN
This paper walks through the steps to build a highly-secure wireless LAN and explains the technical considerations for: • Wireless privacy • Authentication • Client management and NAC • Network firewall and intrusion detection and protection • Identity-based access control • Rogue detection and WIDS • Compliance Read more!

Security Careers: The Mic is Always On. Always.
"This is a big BLEEPING deal," remarked Vice President Joe Biden. Apparently he forgot the microphones were on and sensitive enough to capture his remark, intended to be private. Read More

Not safe for work: What's acceptable office computer use
How many minutes, or hours, did you spend on Facebook today? Even if you spent just a few minutes on the popular social networking site during office hours, you're not alone. Data from Nucleus Research finds 77 percent of workers who have a Facebook account use it during work hours. Read More

IBM research project looks to reshape mobile email
Tired of messing with that bulky email on your smartphone? Well IBM researchers say they are working on a technology that will help users more quickly and efficiently zip through mobile email. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

A brief history of smartphones
How the smartphone went from a high-end enterprise device to an everyday consumer staple.

Summer gadget guide 2010
From a solar-powered watch to a speaker for your bike helmet and a nifty geocache finder, these 10 high-tech toys are perfect for summer.

MOST-READ STORIES

  1. Dell says Ubuntu is safer than Windows
  2. Three things we'd like to see from new Motorola Droid
  3. 10 great illustrations of Linux humor
  4. DNS security reaches 'key' milestone
  5. iPad-controlled helicopter hits shelves in September
  6. Employee monitoring: When IT is asked to spy
  7. The truth about the faces in your Facebook ads
  8. Hackers exploit Windows XP zero-day, Microsoft confirms
  9. AT&T suspends iPhone 4 pre-orders until further notice
  10. Linux trojan raises malware concerns

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment