Friday, August 06, 2010

Smartphones as credit cards: Possibly dangerous, definitely inevitable

5 Windows 7 security features businesses need to know about | Position-based quantum cryptography: A scientific breakthrough?

Network World Compliance

Forward this to a Friend >>>


Smartphones as credit cards: Possibly dangerous, definitely inevitable
Now that AT&T and Verizon have decided to turn smartphones into credit cards, you may be asking yourself, "Is this really a good idea?" Read More


WHITE PAPER: Citrix

NetScaler vs. F5 View the Comparison
Tolly Performance Report: "Citrix NetScaler with nCore Outperforms F5 BIG-IP" shows you how Citrix NetScaler beat F5 in head-to-head tests ? providing 3X faster Web traffic, lower latency and higher throughput. Read now!

VIDEO: Intel

The Anxiety Behind Security and Compliance
What keeps IT executives up at night? Two words: security and compliance, according to a recent quick poll. Remote access is a solid productivity provider, but it can be a bear to manage. Learn where data loss, patch management and help desk anxieties placed among IT concerns. Click Here

5 Windows 7 security features businesses need to know about
The words Windows and security have not always been compatible. In the past, Microsoft's quest to make its operating system as easy to manage as possible for the "typical" user has often meant sacrificing adequate safeguards against intrusion and infection. Windows XP's notorious vulnerability to network worms stands as a recent example; Microsoft shipped the operating system with a firewall but initially left it turned off by default. Read More

Position-based quantum cryptography: A scientific breakthrough?
Position-based quantum cryptography is a discovery that could lead to more secure communications, especially between devices used on military bases and satellites, based on using the geographical position of a party as its only credential, according to new research. Read More

Sophos brings enterprise-level encryption to the Mac
On Monday, security firm Sophos unveiled a new version of its enterprise-class SafeGuard disk encryption app for the Mac. Read More

Centrify announces free security apps, tools
Gartner's recent CIO survey places identity management as the No. 1 security priority through 2011. That's the good news. The same survey also indicates that spending on solutions will be down, however. Fortunately, I guess, vendors are doing what they can to make it easier for you to acquire the identity services you need. Read More


REPORT: Citrix

Gartner Research Note: Load Balancers are Dead
Gartner Research Note "Load Balancers are Dead: Time to Focus on Application Delivery" helps you understand how to replace your basic load balancing technology and focus on getting the highest availability, performance and security for your web apps. Includes key recommendations you can use. Read now!

Private Facebook Data Becomes Big Business
When a security researcher made personal profile information of more than 170 million Facebook users available to the public on BitTorrent--a peer-to-peer file sharing site--many questioned why he did not attempt to sell that information to an interested party. Names and profile data on that many Facebook users is a potential gold mine of valuable marketing data. Read More

CA unveils virtual suite; PacketMotion upgrades compliance product
Today's issue, like the previous one, is devoted to catching up on recent announcements. First up is CA (formerly Computer Associates) with an announcement about five products in what CA calls its "Virtual portfolio". Read More

Microsoft slates record-setting monster Patch Tuesday next week
Microsoft today said it will deliver a record 14 security updates next week to patch a record-tying 34 vulnerabilities in Windows, IE, Office and Silverlight. Read More

Saudi Arabia to ban BlackBerry service on Friday
Saudi Arabia has ordered the suspension of Research in Motion's BlackBerry service as of Friday, as it does not meet current regulations, according to the country's telecommunications regulator. Read More


REPORT: Citrix

Magic Quadrant for Application Delivery Controllers
Citrix Positioned in the Leaders Quadrant for 2009 Application Delivery Controllers Magic Quadrant, Gartner Group. Read now!

Call to step up joint efforts for safer Internet: MS, Adobe
As part of a continued collaboration drive to step up security levels, Adobe Systems has joined Microsoft to step up the Microsoft Active Protections Programme [MAPP]. Read More

Fighting today's malware
How bad is it? Worse than you think. Here's what the new breed of malware looks like -- and what you can do to stop it Read More

Patch or we go public, says bug bounty program
The world's biggest bug bounty program today slapped a six-month deadline on vendors, saying it would release some vulnerability information, even if a patch wasn't ready. Read More

iPhone jailbreak exploit 'sweet' and 'scary,' says researcher
The exploit used to jailbreak Apple's newest iPhone operating system is both "beautiful" and "scary," a noted vulnerability researcher said. Read More

7 Steps to Stronger Enterprise iPhone Security
Which pieces of iPhone security advice should CIOs take to heart, and which should they ignore? Here are seven practices to insist on and three to ignore, according to Forrester Research. Read More

Keeping your company image safe on social media
The umbrella of security responsibilities now includes brand protection at many companies (See Brand protection: The expanding CSO portfolio for an in-depth look) and it seems like a constantly moving target. When the internet took off, organizations had to contend with scammers registering web site domains using company names for fraudulent purposes. Now similar activity is happening on the hottest forum for brand abuse--social networks. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Nine real iPad alternatives
Even since Apple released its "magical and revolutionary" iPad, other vendors have been scrambling to deliver products that go Apple one better. Here are nine that are expected to hit the stores this year.

Defcon badge is unlike anything you have ever seen
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a look at this year's badge.

MOST-READ STORIES

  1. Marketing gone wild: One product helps you stalk, one stalks you
  2. Google Wave washes out
  3. Android 2.2 on Motorola Droid: First impressions of Froyo
  4. Who really sets global cybersecurity standards?
  5. Back to school bargains IT pros will love
  6. Don't mess with Texas: Lessons from IT outsourcing disasters
  7. 5 Windows 7 security features businesses need to know about
  8. Google, Verizon in talks on net neutrality deal?
  9. Nine real iPad alternatives
  10. 10 dream machines almost nobody could afford

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment