Thursday, July 01, 2010

Open Source is a Virus

  iPad Security Breaches Show Danger of Rushing Into Consumer Technology | Heartland ramps up first end-to-end encryption
 
  Network World Security

Forward this to a Friend >>>


Open Source is a Virus
In the computing industry, open source technologies are well known and sometimes even looked down upon; however, many of these solutions have taken root as industry standards and are as common place as many better known technologies such as Microsoft Office. In this blog, I point out 2 extremely successful open source solutions that the average person interacts with daily without even knowing it. Read... Read More


RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

WHITE PAPER: Qualys Inc.

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

iPad Security Breaches Show Danger of Rushing Into Consumer Technology
A number of highly publicized security vulnerabilities are creating concern over enterprise adoption of the Apple iPad. A security group that had identified a long-standing buffer overflow vulnerability in the Safari browser claimed this week that the browser flaw was fixed in MacOS but left unpatched on the iPad. Read More

Heartland ramps up first end-to-end encryption
Heartland Payment Systems, the victim last year of a massive data breach of sensitive card data, vowed after that devastating event to develop new security gear based on end-to-end encryption between itself and its merchants to prevent such a breach from occurring again. That's now taking shape, but slowly. Read More


DOWNLOAD: Qualys Inc.

Security & Compliance Suite Trial
QualysGuard Security & Compliance Suite Trial The 14-day Trial includes: • Unlimited network mapping and discovery • Unlimited network perimeter scans • PCI Compliance scanning • Web application security scanning • IT security policy creation, scanning and reporting Learn More!

Essay forensics: The German caper
I recently had the unpleasant duty of reporting one of my undergraduate students to the Norwich University Academic Integrity Committee (AIC) for suspected academic dishonesty. In this report, without compromising the student's identity (something forbidden by the Family Educational Rights and Privacy Act or FERPA), I want to show academic readers the investigative procedure that resulted in conviction of the student by the AIC and a resulting grade of F on his entire course. Read More

Report points to fraud in Research 2000 polling data
This is a must-read story for political junkies and anyone who just flat-out doesn't trust opinion polls. ... In fact, it's an even more important read for those who do trust opinion polls. The liberal political blog Daily Kos hours ago alleged in a post that it has been the victim of a fraud perpetrated by the polling firm Research 2000 (R2K). In essence, a trio of researchers has shown that poll... Read More


WHITE PAPER: Radware

New Threats Require Real-Time Protection
First generation IPS devices match patterns (or "signatures") of known attack vulnerabilities to safeguard networks. However, a significant amount of threats are dynamic and not addressable by static signature-based IPS devices. Read More Now

Android's enterprise features put it on par with iPhone, not BlackBerry
The official launch this week of the Android 2.2 (a.k.a., "Froyo") platform has been Google's most significant step toward making Android enterprise-friendly. Read More

Hot stuff: Summer gadget guide 2010
It's nearly summer: Time to start singing that piña colada song, slip on your sandals and figure out how many vacation days you have left this year.These 10 gadgets and gizmos will help you enjoy the sun and step away from the computer for a much-needed respite. They're particularly well suited to IT gurus who appreciate a few high-tech features on their summer gear. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

Quiz: Do you know IT security?
Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more.

Your Next Laptop: Concept Designs Point the Way
Tomorrow's models may roll up, sport multiple screens or be repositionable, Transformer-style.

MOST-READ STORIES

  1. Cisco announces business tablet
  2. Hands on with Cisco's "Cius" Android tablet
  3. Android's enterprise features on par with iPhone, not BlackBerry
  4. The pros and cons of Windows 7 security
  5. The 10 Most Uncool Moments in Tech
  6. HP draws on Avaya as a unified communications partner vs. Cisco
  7. Open source is a virus
  8. Cisco tablet not an iPad knock-off: Chambers
  9. Novell's de Icaza: 'People are scared of installing software on Windows'
  10. Wikipedia's million-dollar faux pas

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment