Search This Blog

Tuesday, June 01, 2010

What You Don't Know about Your Online Reputation Can Hurt You

Endpoint security: managing enterprise smartphone risk | Don't Let Your PC Join the Zombie Hordes

Network World Security

Forward this to a Friend >>>


What You Don't Know about Your Online Reputation Can Hurt You
Social networking, and the broader concept of online privacy, have been under some rather intense scrutiny over the past couple of weeks. The issues at Google--voracious indexer of all things Internet, and Facebook--the largest social network and number one most visited site (according to Google) have made many users more acutely aware of what information is available about them on the Internet. However, your online reputation is being used in ways you may not be aware of, and could cost you. Read More


WHITE PAPER: MessageLabs

Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

WHITE PAPER: Novell

File Management Suite
Better track and understand storage patterns, allocate and manage storage based on its relevance and value to the business, while saving money in the administration and procurement of storage resources. Learn to get a handle on the unchecked proliferation of data. Read Now

Endpoint security: managing enterprise smartphone risk
Almost by the day, enterprises are becoming more receptive to the consumerisation of IT and introduction of mobile devices and platforms into their environment. Read More

Don't Let Your PC Join the Zombie Hordes
You may not be aware of this, but aside from Cinco de Mayo, Mother's Day, and Memorial Day, there is another important event in the month of May--Zombie Awareness Month. While the month is intended to honor the sort of Zombieland, Night of the Living Dead, or Michael Jackson's Thriller type zombies, it also seems like an appropriate time to address PC zombies and how to ensure that the computers on your network don't become compromised and join the zombie hordes. Read More

Enterprise risk management: all systems go
When Bill Badertscher arrived at Georgetown University three years ago, campuswide security was handled in several departments with little coordination among teams. It was time for a change. Badertscher is Georgetown's senior engineer for facility and safety control systems and leader of a new IT team that focuses on the same areas. The goal is to address enterprise risk management (ERM) by redefining it to include nontraditional systems. Understanding that security is mission-critical has led the University Safety and Information Services departments to work together in unprecedented ways. Read More


WHITE PAPER: HP

SMB: Strategy Guide to Risk Mitigation
This strategy guide offers concrete risk mitigation techniques specifically designed for midsize organizations. Learn how to proactively manage physical and virtual systems and see the early signs of infrastructure trouble to avoid outages. Read Now!

$100 million 'scareware' CEO was already a fugitive
The CEO of a company accused of making more than US$100 million selling harmful "scareware" antivirus products was already a fugitive from U.S. authorities, following his arrest in 2008 on criminal counterfeiting charges. Read More

The hottest images of cool outer space
Black holes, hungry planets, weird orbits dominate space news Read More

Internet Identity Workshop reveals OpenID clashes
There are too many identity-related trade shows and conferences spread over venues all over the world and not enough time to get to them all. It's a far cry from when we started this newsletter 10 years ago, and the increased interest in identity issues should be applauded, but I can't be everywhere at once! Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Google Wi-Fi Snooping Should Serve As Security Wakeup Call
The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon. Peeved government officials in both Europe and the U.S. are pressing Google for more details on how the search company's Street View cars managed to cull personal data from Wi-Fi networks that weren't password-protected. Read More

US needs plan for online terrorism recruiting, expert says
The U.S. government lacks a plan to counter terrorist recruiting efforts online, even though such efforts by jihad groups are growing, one terrorism expert told U.S. lawmakers. Read More

44 million stolen gaming credentials found in online warehouse
Symantec says it has unearthed a server hosting the credentials of 44 million stolen gaming accounts -- and one of the most surprising aspects of it is that the accounts were being validated by a Trojan distributed to compromised computers. Read More

Exchange 2010 the cure for CDC's e-mail bugs
IT people at the U.S. Centers for Disease Control and Prevention need to use their high tech skills to fight the H1N1 flu or stop the spread of tuberculosis -- not manage the e-mail system. So the federal agency turned to a company called Azaleos Corp. to manage its migration from the Microsoft Exchange 2003 e-mail server to Exchange 2010, a process they started this week. Read More

10 useful Firefox-based apps
Mozilla's underlying Web browser technology also runs non-browser applications Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

40 days of summer (gadgets)
Summer's here and the time is right for looking at gadgets to make the summer days and nights go by easier or more fun at least. If you're going outside to enjoy the sun, hitting the road for a long road trip to a vacation destination, or just staying at home for the perfect "staycation", here are 40 devices or apps we think you'll like.

What if tech companies owned the Wonders of the World?
In this slideshow, we'll take a look into a future where broke governments are forced to sell their most treasured landmarks to the world's richest nerds.

MOST-READ STORIES

  1. Verizon's tiered LTE plans fuel 'bill shock' debate
  2. How to foil Web browser 'tabnapping'
  3. Google is no competitor for Skype - yet
  4. 10 essential BlackBerry apps for travel
  5. New undersea cable feeds African botnets
  6. 10 most controversial technology stories of 2010 - so far
  7. Treasured toys, early technology: Worth more than memories?
  8. Alleged $100M scareware sellers facing charges
  9. Ballmer: 'I'm not going to WWDC'
  10. SQL Server 2010? ... I don't think so ...

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: