Wednesday, September 01, 2010

Data breaches begin close to home

NetApp, Syncsort team up on data protection | Google disputes bug patching report

Network World Security: Identity Management

Forward this to a Friend >>>


Data breaches begin close to home
Last issue I pointed you to a story that Oracle's Mark Dixon had sent me about a manager who kept using the accounts of departed subordinates to co-sign authorizations that helped her steal $11 million dollars from her organization. Mark had more to say on data breaches, though. Read More


WHITE PAPER: Watchguard

10 questions to ask before you buy an anti‐spam solution
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

WEBCAST: Akamai Technologies

Increase Download Completion Rates
Join IDC for this live Webcast as new research on Electronic Software Delivery is revealed. Find out how to effectively monitor and deliver small and large downloads to ensure end user success and satisfaction. And because it's live, you can ask the experts questions specific to your environment. Register Today.

NetApp, Syncsort team up on data protection
NetApp and Syncsort are bringing storage and data protection together in a single product, NetApp Syncsort Integrated Backup, to offer quick backup and restoration of an enterprise's data. Read More

Google disputes bug patching report
Google argued that a recent report by claiming it failed to patch a third of the serious bugs in its software had the facts wrong. IBM's X-Force admitted the error. Read More

Scam preys on required TweetDeck update
Scammers are trying to take advantage of the fact that many users will soon have to update their version of the TweetDeck Twitter software. Read More


WEBCAST: Palo Alto Networks

60 Minutes: The Future of the Perimeter
Join two pioneers in network security: Nir Zuk and Marcus Ranum, for what promises to be a very lively discussion on the future of the network perimeter. As applications and users move in and out of the enterprise network, what happens to the network perimeter as we know it? Does it go away? Evolve? How should organizations address these changes? Sign up now!

Security-as-a-service growing
When you ask IT professionals if they use cloud computing or software-as-a-service, most start by saying "no". But if you ask some follow up questions, you will quickly find out about "that one application" that is a SaaS application. Read More

Gmail promo for Priority Inbox creeps out Chrome users
Chrome users yesterday bombarded Google's Gmail support forum with complaints about music suddenly playing in the background when they reached their inboxes. Read More

3M offers $943M for biometric security vendor Cogent Systems
3M has agreed to buy biometric access control systems vendor Cogent for around US$943 million in cash. Read More


WHITE PAPER: Alcatel-Lucent

Alcatel-Lucent 7750 Service Router
Looking for routers that offer the scalability to extend your reach with cost-effective, feature-rich platforms that consolidate and deliver the business, residential and mobile services your customers demand? For a limited time, introductory kits are available for the newest additions to the Alcatel-Lucent 7750 SR portfolio. Read Now

Old Apple QuickTime code puts IE users in harm's way
Apple's failure to clean up old code in QuickTime leaves people running Internet Explorer (IE) vulnerable to drive-by attacks, a Spanish security researcher said today. Read More

Bridging the Gap in Cloud Security
How Merit Medical protects off-premise data while offering users a single sign-on. Read More

Richard Clarke: Preparing For A Future Cyberwar
Former White House cybersecurity adviser Richard Clarke thinks the government should do more to defend companies against cyberthreats. Read More

Organizing sensitive data in the cloud
What does a cloud vendor do to properly segment various types of sensitive data within its cloud? Gregory Machler discusses how to capture the metadata you'll need. Read More

Trend Micro brings encryption to the cloud
Trend Micro is blazing a new trail with a service called SecureCloud intended to give enterprises a way to encrypt data in cloud-computing environments. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Are you the corporate geezer?
Our first Geezer Quiz in 2009 has been so popular that we've created this new set of questions that will test your memory and perhaps also bring on a wave of nostalgia for the days of minicomputers, X.25 and token ring. Keep score and see how well you do at the end. Enjoy!

The hottest virtualization products at VMworld
With VMworld kicking off in San Francisco, this is one of the biggest weeks of the year in the virtualization industry. VMware, Citrix, EMC and many other companies are releasing new virtualization technologies or adding virtualization capabilities to existing products. Here's a roundup of what's being announced this week.

MOST-READ STORIES

  1. Burning Man's open source cell phone system could save the world
  2. Research experiment disrupts Internet, for some
  3. Cisco making a play for Skype?
  4. Android 2.2: How to install Flash on Froyo
  5. Moving a data center? Avoid these four career-limiting mistakes
  6. Microsoft flaunts customer dumping VMware
  7. Skype launches Skype Connect for businesses
  8. iPad lures business users in law, medicine and other fields
  9. Excel 2010 might be slower than Excel 2003 for power users
  10. Why Cisco wants to purchase Skype

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment