Thursday, August 05, 2010

5 Windows 7 security features businesses need to know about

  7 Steps to Stronger Enterprise iPhone Security | Who really sets global cybersecurity standards?
 
  Network World Security

Forward this to a Friend >>>


5 Windows 7 security features businesses need to know about
The words Windows and security have not always been compatible. In the past, Microsoft's quest to make its operating system as easy to manage as possible for the "typical" user has often meant sacrificing adequate safeguards against intrusion and infection. Windows XP's notorious vulnerability to network worms stands as a recent example; Microsoft shipped the operating system with a firewall but initially left it turned off by default. Read More


WHITE PAPER: Cisco

Learn the 3 Best Practices for Securing E-mail
Any IT manager will tell you it's critical to protect data. With information flowing freely today via mobile devices, collaboration technologies and unified communications, it isn't easy. Learn data leak prevention (DLP) triage and the steps to protect proprietary data in e-mail, while also complying with government and industry regulations. Read now!

WHITE PAPER: MessageLabs

The Wild, Wild Web: How to Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

7 Steps to Stronger Enterprise iPhone Security
Which pieces of iPhone security advice should CIOs take to heart, and which should they ignore? Here are seven practices to insist on and three to ignore, according to Forrester Research. Read More

Who really sets global cybersecurity standards?
Herding wild cats may be easier than settling issues or making over-arching decisions that affect international cybersecurity. Read More

Saudi Arabia to ban BlackBerry service on Friday
Saudi Arabia has ordered the suspension of Research in Motion's BlackBerry service as of Friday, as it does not meet current regulations, according to the country's telecommunications regulator. Read More


WHITE PAPER: MessageLabs

Employee Web Use and Misuse:
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection. Read Now

InfoWorld review: Meeting the network security and compliance challenge
ArcSight, LogRhythm, and NitroSecurity lead a strong field in mining event log data for security alerting, compliance auditing, and countless other uses Read More

Log management review: Splunk 4
Splunk doesn't have all the features of the top competitors, but pairs good value with an active development community Read More

Microsoft sticks to plan, denies emergency patch for XP SP2
Although some had hoped that Microsoft would violate its own patching policy, the company yesterday stuck to its guns and declined to provide a fix for a critical bug to users running Windows XP Service Pack 2. Read More


WHITE PAPER: MessageLabs

Top Ten Web Threats and how to eliminat
This paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department. Read Now.

Police bust e-crime gang for online bank thefts
UK and Irish police have today swooped on an international e-crime gang accused of attempting to steal money from up to 20,000 online bank accounts and credit cards in the UK. Read More

Hackers demontsrate how attack can identify user's location
A new online attack can identify exactly where a web user is surfing the net from. Read More

Facebook logins freely available on Net, researcher finds
Far from having to force hack Facebook passwords in the style of last week's harvesting exercise by Canadian researcher Ron Bowes, it turns out that thousands are already freely available on the Internet. Read More

Juniper's Mobile Device Security Gamble
Cisco Systems has purchased dozens of companies in its history so most deals receive relatively little attention. There are exceptions however. When Cisco acquired companies like Scientific-Atlanta (2005), WebEx Communications (2007), and Jabber, Inc. (2008), it signaled a change. Cisco was broadening its strategic focus and viewing the network as a platform rather than a series of boxes. To this... Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Nine real iPad alternatives
Even since Apple released its "magical and revolutionary" iPad, other vendors have been scrambling to deliver products that go Apple one better. Here are nine that are expected to hit the stores this year.

Defcon badge is unlike anything you have ever seen
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a look at this year's badge.

MOST-READ STORIES

  1. Position-based quantum cryptography: A scientific breakthrough?
  2. Nine real iPad alternatives
  3. BlackBerry Torch 9800 Slider gets official on AT&T
  4. Cisco settles antitrust suit over software updates
  5. FBI looks just plain silly in logo beef with Wikipedia
  6. StarCraft 2 sales: 1 million on day one, 1.5M in 48 hours
  7. Extreme Networks taps CEO with enterprise network experience
  8. Microsoft: VMware customers are 'Windows customers first'
  9. BlackBerry Torch could sink or swim on OS 6
  10. Firefox falls further behind in browser wars

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment