Tuesday, July 13, 2010

15 Free Enterprise Collaboration Tools

The virtual blind spot | Top 10 social networking threats

Network World Daily News AM

Forward this to a Friend >>>


15 Free Enterprise Collaboration Tools
Whether your business is looking to start small or go big, many free tools can help jumpstart your enterprise collaboration efforts. Here's a look at 15 of the best -- some old, some new, some basic and some robust. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: IBM

Fighting the Tide
Aberdeen Group recently examined how companies are using Business Intelligence (BI) tools to adapt to today's market pressures. This report focuses on IBM Cognos 8 BI users and compares the results they are seeing to other survey respondents. Read More

The virtual blind spot
Malicious hypervisors. Subversive virtual machines. Live migration impersonators. Welcome to the world of server virtualization, where the threats are new and the traditional security tools like firewalls and intrusion-prevention systems don't cut it anymore. Read More

Top 10 social networking threats
Social network tools have changed the way we interact in our personal lives and are in the process of transforming our professional lives. Increasingly, they play a significant role in how business gets done. But they're also high risk. With hundreds of millions of users, these tools have attracted attackers more than any other target in recent years. Read More

Researchers unsheathe new tool to battle botnets
While many botnets such as Storm, Kraken and Conficker can carry out their destructive campaigns without detection or any particular means to stop them, a group of researchers says it has come up with a way to use a botnet's own technology to defeat it. Read More

Third-party software bugs skyrocket in 2010
A surge in third-party software vulnerabilities accounted for the bulk of a ballooning bug count in the first half of 2010, said Danish security firm Secunia today. Read More

Microsoft extends Windows XP downgrade rights until 2020
Just a day before Microsoft drops support for Windows XP Service Pack 2 (SP2), the company announced on Monday that people running some versions of Windows 7 can "downgrade" to the aged operating system for up to 10 years. Read More


RESOURCE COMPLIMENTS OF: Avenda Systems, Inc.

Avenda Tops Network World's NAC Shortlist-40
Recent Clear Choice Test conducted by Joel Snyder outlines how Avenda's eTIPS Identity-Aware platform is Head and Shoulders above the rest for user and endpoint-based, access control and authorization. For a full-featured solution with ease of use, find out why the tester is saying, "eTIPS should be a prime candidate for NAC in your network". Read More

VMware halves price of starter virtualization kit
VMware has cut in half the price of a virtualization software package geared toward small and midsize businesses, and changed the way it prices management products to let customers avoid unnecessary charges. Read More

Cisco rival Brocade for sale again?
This rumor is not exactly hotter than a July 4 firecracker. Over the weekend, The Register posted the possibility that Cisco partners/rivals IBM, Dell and Juniper may be interested in acquiring Cisco rival Brocade. Read More

Security expert releases Ubuntu Linux distro for malware analysis
A security consultant has released a Ubuntu-based Linux distribution specifically designed to help analyze and re-engineer malware. Lenny Zeltser on Thursday released REMnux on Sourceforge and it has already been downloaded nearly 2,000 times. Read More

Community College Surge: IT education on a budget
When Bob Kansa graduated with a bachelor's degree in computer science almost 40 years ago, a surprise awaited him on his first day of work: He was unprepared for the job. Read More

Consumer Reports knocks iPhone 4 for reception issues
Despite Apple's claims that the iPhone 4's reception problems are merely related to a faulty algorithm, other parties aren't so sure. The latest to ding the phone is Consumer Reports, which has said that it will not recommend the iPhone 4, despite the device's otherwise high marks. Read More


WHITE PAPER: Qualys

Justifying IT Security
The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk. Read now!

Complaints mar Google Android App Inventor
Google's App Inventor for Android has inspired some early complaints from users who claim they have not been able to install the software on 64-bit Windows 7 machines. Read More

Oracle to issue 59 critical patches
Oracle on Tuesday will release 59 patches to fix security weaknesses affecting hundreds of products, according to a notice on its Web site. Read More

How to use HTML5 on your website today
There's been lots written about the politics and process of the emerging HTML5 specification, but what working Web developers primarily want to know is: What can I do with HTML5, and when can I start using it? The good news is that there's a lot you can do with HTML5. The better news is that there's a lot that you can do with HTML5 today. Read More

How to minimize server consolidation mistakes
Joe Latrell, IT manager and lead programmer for GetMyHomesValue.com, a real estate data services company in Lancaster, Pa., knows that it's all too easy for even a knowledgeable and experienced IT veteran to make mistakes while managing a complex server-consolidation project. "You have to think about everything," he says. "It can be a minefield." Read More

Making sense of client virtualization
Not long ago server virtualization was IT's New World, inhabited by a relatively few courageous souls who dared to break the framework of one server per application and one application to server. The others stood faithfully by rooms filled to capacity with servers, cabling, cooling equipment and hotspots. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

Quiz: Do you know IT security?
Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more.

Your Next Laptop: Concept Designs Point the Way
Tomorrow's models may roll up, sport multiple screens or be repositionable, Transformer-style.

MOST-READ STORIES

  1. Java supplants IT security as most sought-after tech skill set
  2. iPhone 4 "bursts into flames!" Probably the antenna
  3. Apple unveils four new iPhone 4 commercials, all feature Facetime
  4. SIP trunking: A primer
  5. Hacker claims to have cracked Skype protocol
  6. Droid X, iPhone drive data usage and pricing shifts
  7. Researchers tout new weapon in Internet censorship arms race
  8. Military wants Holy Grail of secure encryption technology
  9. How to keeps Windows XP SP2 safer after Microsoft stops patching
  10. Cisco warns attendees that the Cisco Live database was hacked

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment