Monday, August 23, 2010

How Intel bid could shake up IT security; World's worst PowerPoint presentations

  The World's Worst PowerPoint Presentations | Linux community finally fixes six-year-old, critical bug
 
  Network World Security

Forward this to a Friend >>>


McAfee inside: How Intel bid could shake up IT security
Intel has pledged that its proposed $7.68 billion McAfee buyout will result in more secure networked devices through an integration of software and hardware that will challenge offerings from other big security vendors and perhaps change the way in which security is delivered to enterprise IT shops. Read More


WHITE PAPER: NetApp

Reduce Storage Costs through Virtualization
A mature technology being deployed by thousands of data centers, Thin Provisioning can provide immediate, significant economic benefits. Read More!

WHITE PAPER: MessageLabs

The Wild, Wild Web: How to Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

The World's Worst PowerPoint Presentations
Convoluted flow charts? Tacky, out-of-focus graphics? Huge blocks of text? Welcome to PowerPoint Hell.Most of you have probably had to make a PowerPoint presentation, so you probably know the basic PowerPoint rules: Use a lot of bullet points. Don't overdo the text. Avoid multimedia excesses. Et cetera.It might seem like pretty basic stuff to you, oh PowerPoint Guru, but unfortunately it's not so obvious to some other people. We took a stroll through the PowerPoint presentation-sharing site, Slideshare.net, and found a scarily large number of really bad PowerPoint presentations. Here are some of the worst (or should we say best?) ones of the bunch. Read More

Linux community finally fixes six-year-old, critical bug
Julie Bort: The Linux kernel folks "silently" pushed out a patch for a critical privilege escalation bug this week. It fixed a hole that could allow an attacker to execute code at the root The patch took two months but the hole was around, and known, for years. Read More

Intel-McAfee Deal: Secure Mobility By Design
The news of Intel acquiring McAfee for nearly $8 billion caught the tech world off guard and perplexed analysts at face value. The fact is that it doesn't make much sense based on the Intel and McAfee of today, but as the dust settles the deal makes more sense when viewed as a visionary shift with an eye on where technology is headed--everywhere. Read More


WHITE PAPER: MessageLabs

Gartner Magic Quadrant for Secure Email Gateway
This industry report covers the email gateway market. Gartner, Inc. positions Symantec Hosted Services in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention). Read the entire report. Read Now

Panel drafts privacy recommendations for health data exchanges
A "tiger team" that advises the federally charted Health IT Policy Committee will submit a list of recommendations on Thursday for ensuring the privacy and security of personally identifiable health information in Health Data Exchanges. Read More

I Quit! 8 Dramatic Ways to Leave Your Job
When you're ready to say "Take this job and shove it," how should you deliver the message? With thanks to JetBlue's newest hero, here's a look at 8 unique job resignations using everything from song to sheetcake Read More

Acquisitions blunting security innovation, say users, analysts
Some users and analysts fear that the continuing acquisitions of security vendors by some of the largest firms in the business could have a chilling effect on technology innovation. Read More


WHITE PAPER: MessageLabs

Top Ten Web Threats and how to eliminat
This paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department. Read Now.

How Did My Protected PC Get Infected?
SUPERAntiSpyware found three Trojans on Bill Artman's PC. Bill asked the Windows forum how this could happen when his PC is protected. Read More

Man accused of writing 'squid-octopus' virus
A Japanese man has been accused of a bizarre virus attack in which files on infected PCs were destroyed before having their file icons replaced with manga-like drawings of sea creatures. Read More

How to turn Facebook Places off
Now that Facebook Places has been turned on, users who are uncomfortable with sharing their locations with Facebook friends should consider going through their privacy settings and making sure they aren't sharing more information than they are comfortable with. Read More

Reducing Code Risks with Open Source
In the old days, the commercial licensing model for software was fairly straightforward -- and somewhat risky: Read More

Who are these people who think cybersecurity experts are crying wolf?
It happened again Monday that a news report about the threat of cyberattacks was greeted with skepticism. It's happened in the wake of some of my previous posts on the subject that commentors said the security experts warning of the threat are only scaring people in order to sell their security products and consulting services. I'm not sure we can put their warnings in the same category as burglar... Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: RIM BlackBerry Torch 9800 vs. Apple iPhone 4
Apple's iPhone has reinvented the mobile phone, while the longtime smartphone king, the venerable BlackBerry, has been slow to change. Now, Research in Motion has updated the BlackBerry to incorporate modern touch capabilities while remaining very much a BlackBerry. Here's how the two devices compare in everyday usage.

Hands-On Tour: Google Goggles Visual Search
Google Goggles -- not to be confused with Google Mail Goggles, the company's inebriated e-mailing preventer -- lets you search from your cell phone simply by snapping a photo. Want more info on a product? Take its picture. Need info about a business? Photograph the storefront. Put simply, this thing packs some serious power, and its capabilities stretch far.

MOST-READ STORIES

  1. Zero-day Windows bug problem worse than first thought
  2. Linux community finally fixes 6-year-old critical bug
  3. Intel-McAfee deal baffles security analysts
  4. Android 2.2: How to install Flash on Froyo
  5. Intel buys McAfee: My two cents
  6. Microsoft won't showcase Hyper-V at VMworld
  7. Cameron Diaz could wreck your PC, McAfee warns
  8. Decorate with Linux
  9. Intel to buy McAfee in $7.68 billion blockbuster
  10. Does Intel buying McAfee have any impact on open source

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment