Search This Blog

Monday, July 12, 2010

How to keep Windows XP SP2 safer after Microsoft stops patching

5 tips for managing Microsoft licensing costs | The White House plan to safeguard cyberspace

Network World Daily News AM

Forward this to a Friend >>>


How to keep Windows XP SP2 safer after Microsoft stops patching
Tuesday marks the end of patches for Windows XP Service Pack 2 (SP2). If you're still running that edition of XP, you can still take steps to protect your PC. Read More


WEBCAST: Nimsoft

Reasons to Consider Cloud IT Monitoring
Join this Webcast to learn the value of IT monitoring delivered via the cloud. You can monitor and manage all business applications, from the data center to the cloud, including SaaS, hosted, and virtualized environments—all with a single product, architecture, and console. There's even a 30-day free trial download. View Now

WHITE PAPER: Qualys

Justifying IT Security
The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk. Read now!

5 tips for managing Microsoft licensing costs
If you're running a business of any size, chances are you're a Microsoft customer. But unless you're an expert negotiator, there's a good chance you're paying too much for Microsoft licenses. Read More

The White House plan to safeguard cyberspace
The plan to "reduce cybersecurity vulnerabilities and improve online privacy protections" floated in June by Howard Schmidt, the Cybersecurity Coordinator and Special Assistant to the President, is comprehensive and an important step in the right direction. Read More

Newest Attack on your Credit Card: ATM Shims
Shimming is the newest con designed to skim your credit card number, PIN and other info when you swipe your card through a reader like an ATM machine. Read More

SIP trunking: A primer
A beginner's guide to SIP trunking. Read More


WHITE PAPER: IBM

BI for Business Users
This white paper explores how today's advanced business intelligence solutions can put powerful, informative BI information into the hands of more users. Read More

Review: Firewall operations management
Anyone running multiple firewalls in a complex, enterprise environment knows how difficult it can be to catch misconfigurations, avoid conflicting rules, identify vulnerabilities and meet auditing and compliance mandates. Read More

Podcast: There's a Hacker in My Copier! (and other hidden office dangers)
Adam Bosnian from Cyber-Ark Software chats with Keith Shaw about five different areas within the enterprise where potential security exists, including the digital copier, printer/scanner and wireless routers. (11:48) Read More

Apple unveils four new iPhone 4 commercials, all feature Facetime
If there was any doubt as to which iPhone 4 feature Apple feels is the device's strongest selling point, then these new commercials certainly clear things up. Apple recently rolled out four new iPhone commercials which all focus entirely on Facetime, and in typical Apple fashion, all strike an emotional chord. Read More

Microsoft can thank Apple for Windows 7 popularity
More than half of software developers are already building applications for Windows 7 and nearly 80% will do so within the next year, a new survey has found. And somewhat ironically, Microsoft might have Apple to thank for developer interest in its new operating system. Read More


WHITE PAPER: Shoretel

Simplify System Management
Telephone system manageability depends to a great extent on the underlying architecture of the voice system. The architectural approach for integrating new systems has serious implications for management. In this paper you will learn more about how various architectural approaches impacts overall system manageability. Read now!

Feds Pull the Plug on Funding for IT Projects
President Obama's approach to IT spending showed its teeth this week in a decision to end new spending on about 30 financial systems that cost about $3 billion in annual development. Read More

Offshore outsourcing picking up after recession: Everest
The outsourcing market is witnessing an increase in activity as the global economy recovers from the recession of 2009, according to a report by Everest Research Institute. Read More

Next iPod Touch: 7 Must-Haves
If the latest Apple rumor is true, a new iPod Touch should arrive in September. U.K. retailer John Henry says we can expect an iPhone 4-inspired device with a front-facing camera, video chat, and a gyroscope. Read More

Taking distracted driving to the next level
Headed west on the Massachusetts Turnpike, I pass a car being operated by a young woman who has both hands firmly on the steering wheel, just like they teach when you get your license. Rather than the classic 10 o'clock-2 o'clock positioning, however, hers are clamped more like 11:45 and 12:15, or the optimum setup for thumb-texting on whatever mobile device it was she had balanced in between. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

Quiz: Do you know IT security?
Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more.

Your Next Laptop: Concept Designs Point the Way
Tomorrow's models may roll up, sport multiple screens or be repositionable, Transformer-style.

MOST-READ STORIES

  1. Military wants Holy Grail of secure encryption technology
  2. Cisco warns attendees that the Cisco Live database was hacked
  3. The best Windows 7 downloads
  4. Cisco Live 2010 attendees list hacked
  5. Cisco considers IOS for cert self study
  6. iPad invades corporate America
  7. Hackers edge toward unlocking iPhone 4 OS and network
  8. Movie 'Despicable Me' finds hero in behind-the-scenes technology
  9. VMware: no 'timeline' for release of delay-ridden hypervisor
  10. Poor SSL set-up can kill e-commerce

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment:

Anonymous said...

I would like to exchange links with your site www.blogger.com
Is this possible?