Tuesday, July 27, 2010

How can employee-owned mobile devices be secured and managed on corporate networks?

  Cybercrime costs a business $3.8 million/year, study finds | Yahoo will invest in hackers with good ideas
 
  Network World Security

Forward this to a Friend >>>


How can employee-owned mobile devices be secured and managed on corporate networks?
With the rise of personal mobile devices, a growing number of enterprises have scrapped the homogeneity mandate: instead of requiring employees to use a standard smartphone, more IT departments are now looking at some degree of control over employee-owned (or "employee-liable") devices, to manage and secure them. Read More


WHITE PAPER: Shoretel

Simplify System Management
Telephone system manageability depends to a great extent on the underlying architecture of the voice system. The architectural approach for integrating new systems has serious implications for management. In this paper you will learn more about how various architectural approaches impacts overall system manageability. Read now!

REPORT: Radiant Logic, Inc

Download Latest Gartner Report on IdM
Today's centralized identity infrastructure can't keep up with tomorrow's increasingly federated demands, from user-centric identity, to Identity-as-a-Service, and the cloud. In "The Emerging Architecture of Identity Management," Gartner outlines a vision for tomorrow's identity landscape--one with virtualization at its core. Download the report--free!

Cybercrime costs a business $3.8 million/year, study finds
A new study of 45 U.S. organizations found that cybercrime -- including Web attacks, malicious code and rogue insiders -- costs each one of them $3.8 million per year, on average, and results in about one successful attack each week. Read More

Yahoo will invest in hackers with good ideas
Yahoo is considering investing in hackers with good ideas and technologies, a company executive said on Saturday. Read More

Hackers Don Black Hats in Vegas Next Week
If you have plans to travel to Las Vegas next week, you may want to cancel them. Why? Because the city will be crawling with hackers attending a "Black Hat" conference on electronic security. Read More


WHITE PAPER: MessageLabs

The Wild, Wild Web: How to Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

US awards $122M for new lab that will spin sunlight into fuel
Making clean fuel out of sunlight is the idea behind a $122 million US Department of Energy award to a team of California researchers. Read More

Do Identity-Theft Protection Services Work?
Todd Davis is best known as the CEO of identity-theft protection company LifeLock who used his own Social Security number in his company's advertising as a sign of his confidence in the service. In May, it was widely reported that Davis's identity had been stolen at least 13 times. The controversy over LifeLock's advertising ultimately cost the company $12 million in fines. Read More

The quiet threat: Cyber spies are already in your systems
Special report: Electronic espionage from China and others could be stealing your vital product and business information right now Read More


WHITE PAPER: Qualys

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

Reliable Encryption for the Rest of Us
Though encryption is a strong way to safeguard passwords, personal information, and other sensitive data, it can be confusing due to the acronyms and technobabble that surround the topic. Read More

New rootkit threatens all versions of Windows
Microsoft has confirmed a new, highly dangerous zero-day vulnerability that has caused multiple researchers to issuing warnings. The exploit is a whopper on all levels. Read More

IBM takes dim view of EU claims "being made by Microsoft and its satellite proxies"
IBM responded angrily to the claims behind investigations being brought by the European Union today that the company has abused its dominant market position in mainframe computers. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Say what?
Earlier this month, Microsoft's chief operating officer made a statement that sent everyone's jaws a-dropping. "It looks like the iPhone 4 might be their Vista, and I'm OK with that," he said during a keynote speech at the company's annual partner conference. It got me thinking about quotes that have and will go down in history from the industry's most famous executives. Can you guess who made the following statements?

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. WPA2 vulnerability found
  2. Apple grants ABC access to its secretive "black labs"
  3. Cisco study warns against "FarmVille"
  4. Avaya CEO on how to win over Nortel customers
  5. Massive sunspot can be seen with naked eye, but don't look
  6. Certified lies: Big Brother in your browser
  7. Microsoft signs big licensing deal with Arm chip technology
  8. Is Sprint losing its WiMAX/4G gamble?
  9. Mobile deathmatch: Apple iOS 4 vs. Android 2.2
  10. Should you even bother looking at Windows Phone 7?

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment