Wednesday, June 16, 2010

Privacy concerns are nothing new

Enough blame to go around in iPad security breach | Election hacking

Network World Security: Identity Management

Forward this to a Friend >>>


Privacy concerns are nothing new
Last issue we looked at the controversy surrounding Google's collection of what appears to be personally identifiable data and storing it in databases for all and sundry to search. Some folks are up in arms about this, and I applaud them. But privacy issues like this are nothing new. Read More


WHITE PAPER: HP - Cupertino

Guide: Best Vmware backup method for you
Although data protection processes developed for physical environments can be used for virtual environments, backup processes specifically designed for virtualized environments are more flexible and scalable. This whitepaper presents information to assist in making a considered choice of data protection method for your VMware environment. Read Now.

RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

Enough blame to go around in iPad security breach
The leader of a security research firm and AT&T traded angry words Monday in the wake of last week's data breach that exposed the e-mail addresses of 114,000 iPad 3G users. The carrier called the behavior of Goatse Security "malicious," while the security firm countered that AT&T was "being dishonest about the potential for harm." But both sides have plenty to answer for in how they've handled this security situation. Read More

Election hacking
Voting is a sacred right and an awesome responsibility. My Greek heritage makes me proud of the origin of voting, while my American citizenship makes me a beneficiary of its strongest instantiation. As a security expert, I am deeply suspicious of electronic voting machines, especially those that do not have auditable logs. So it is no surprise to me that the rush to adopt paperless, non-auditable electronic voting machines has subverted trust in the process and outcome of elections. The most recent example comes from the South Carolina primary. Read More

Cloud security: The basics
Cloud computing is one of the most-discussed topics among IT professionals today. And not too long into any conversation about the most highly touted cloud models--software as a service (SaaS), infrastructure as a service (IaaS) or platform as a service (PaaS)--the talk often turns to cloud security. Read More


WHITE PAPER: IBM Corporation

IBM System z and Web 2.0 deliver value together
This update explains how IBM® System z® customers with IBM WebSphere® Portal 6.1 software are better positioned to leverage Web 2.0 technologies. With version 6.1 you can deploy applications across your enterprise, reduce costs and increase flexibility with workloads centralized on System z servers. Learn More Now

Cloud security in the real world: 4 examples
We laid out the essential concepts of cloud security in Cloud security: The basics. Read More

Hackers exploit Windows XP zero-day, Microsoft confirms
Hackers are now exploiting the zero-day Windows vulnerability that a Google engineer took public last week, Microsoft confirmed today. Read More

Sophos: Facebook failing to tackle likejacking
More than four in five (95 percent) of web users believe Facebook isn't doing enough to protect social networkers against 'likejacking attacks', says Sophos. Read More


WHITE PAPER: IBM Corporation

Data warehousing with DB2 family for IBM System z customers
Discover the unique support for data warehousing and business intelligence offered by the IBM® DB2® portfolio. This white paper shows how an IBM System z® server, integrated with the IBM DB2 family of solutions, can help you meet requirements for data warehousing and business intelligence. Learn More Now

Put your 'crapplications' into the cloud, experts suggest
Cloud Leadership Forum speakers opine on which applications are best for the cloud. Read More

Using e-mail safely and well
In recent columns, I've been posting notes for public discussions on topics of Internet safety and appropriate behavior held at the Brown Public Library in Northfield, Vt. Today's column is the one-pager I distributed at the second of the discussions, which dealt with a few key points about using e-mail effectively and safely. Many of the points were drawn from articles originally published in this column over several years and collected in "Using E-mail Safely and Well" which is freely available for distribution (but not for re-posting on public Web sites). Read More

Code Security: SAFECode report highlights best practices
A new report from the Software Assurance Forum for Excellence in Code (SAFECode) sheds new light on how vendors are trying to work more secure coding into the product development process. Read More

Linux Trojan Raises Malware Concerns
I've got good news and bad news for those of the misguided perception that Linux is somehow impervious to attack or compromise. The bad news is that it turns out a vast collection of Linux systems may, in fact, be pwned. The good news, at least for IT administrators and organizations that rely on Linux as a server or desktop operating system, is that the Trojan is in a game download so it should have no bearing on Linux in a business setting. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

A brief history of smartphones
How the smartphone went from a high-end enterprise device to an everyday consumer staple.

Summer gadget guide 2010
From a solar-powered watch to a speaker for your bike helmet and a nifty geocache finder, these 10 high-tech toys are perfect for summer.

MOST-READ STORIES

  1. BP, in crisis mode, misses social networking target
  2. Apple's iPhone 4: A pre-order guide
  3. Google, Microsoft online apps both fail over privacy
  4. Linux trojan raises malware concerns
  5. Rogue Facebook app touts 'Teacher nearly killing a 13-year-old boy'
  6. Online porn users take huge risks, study finds
  7. How to get into medal of honor beta
  8. Twitter adds location to messages
  9. Safari 5 in depth: Has it sped past Chrome?
  10. Vodafone reveals iPhone 4 handset price

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment