Wednesday, October 20, 2010

Naysayers, get over yourselves. The cloud is secure.

FTC shoots down cyber-vultures at Google Money Tree | Facebook's Privacy Breach: What You Need to Know

Network World Security

Forward this to a Friend >>>


Naysayers, get over yourselves. The cloud is secure.
Security fears remain a top impediment to broad adoption of public cloud servicesIf you listen to the arguments about security in the cloud they sound compelling, and generally fall into two categories: technical risks, and policy issues. Read More


WEBCAST: Bradford Networks

Step-by-Step Process to Network Security
Hear from one financial services IT pro who thought his network was completely secure until it failed an internal security audit. Tim Childress from the credit card division of Bridgestone discusses the unique approach he took to improve network security. Hear how he met his objectives to stop rogue devices, gain better network visibility. View now

WEBCAST: Splunk

SIM Overview and Market Drivers
Forrester Senior Analyst, John Kindervag provides an overview of what issues are driving SIM adoption and some of the key capabilities end users should look for when evaluating a SIM solution. View now!

FTC shoots down cyber-vultures at Google Money Tree
FTC continues assault on economic cyber-scammersThe Federal Trade Commission last year vowed to go after companies preying on what it called  cyber-vultures looking to feast on consumers and businesses suffering from the down economic situation. Read More

Facebook's Privacy Breach: What You Need to Know
Facebook is in the privacy hot seat again, but not because of invasive new features or a policy change. This time, several third-party Facebook apps, including popular games such as Farmville, were caught transmitting User IDs to advertisers and Internet tracking firms, according to a Wall Street Journal investigation. Read More

With a couple of hiccups, NASA satellite half way to Pluto
NASA New Horizons satellite taking aim at PlutoOver-coming a couple "stressful" hiccups, NASA's New Horizons satellite mission to Pluto has Read More


WHITE PAPER: HP

Securing Virtualized Data Centers
Understand the real need for security solutions that can address the reality of expanding virtualization. You will also learn how HP TippingPoint's secure virtualization framework allows organizations to gain control of the virtual environment by introducing in-line security policy enforcement. Read Now

72% of parents monitor their kid's facebook page
Nearly three quarters of parents monitor their child's social networking account, says TRUSTe. Read More

Second Wave of Adware Pounds Web Surfers
New adware companies are increasingly targeting Facebook, Twitter, and other popular social networking sites as a means of distribution. The share-friendly environment of such sites is ideal for spreading adware and trackware through third-party applications, which often hide their true intent. Read More

DHS simulates terror attack in subway systems
In 1995, the subway system in Tokyo was the target of a domestic terrorism attack involving a potent gas called sarin, a chemical weapon that can cause neurological damage and even death. In five coordinated incidents, members of a radical-religious group known as Aum Shinrikyo released the sarin gas on five trains in the Tokyo subway system. The attack killed 12 commuters, seriously injured 54 and affected 980 more who experienced some health effect. The lesson learned in the tragedy was that chemical agents have the potential do widespread damage -- and a subway system provides an ideal environment for dangerous gas to travel fast. Read More


WHITE PAPER: Cisco Ironport Systems

Cloud Security - Hurdles and Misconceptions
Computing is inevitably moving to the cloud, as is security. A recent poll among IT managers reveals that companies are either using or considering cloud-based security. This report looks at their reasons for doing so, and some hurdles or misconceptions that must be overcome. Read now!

Privacy? Run a background check on yourself
My company hired a new employee recently and as part of my responsibilities, I ran a basic background check for our new hire. If you've never seen a professional background check, you will most likely be shocked by the level of detail that can be gleaned from public records. Read More

IT industry says improving cyber security will be tough
Huge improvements are needed in the government's approach to cyber security, the IT security industry has warned ahead of today's Strategic Defence and Security Review. Read More

New Rules for Employees' Mobile Device Privacy
How CIOs should adjust their privacy policies to conform to the Supreme Court's decision on monitoring employees' text messages. Read More

Facebook Quick Tip: 3 More Ways to Shore Up Security
Yes, Facebook has made some privacy mistakes. But to its credit, the social networking giant has been busing rolling out update after update in an effort to win back its users' trust. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

Seven secret weapons for network management on a budget
I am constantly looking for new open source tools that can make my life easier or allow me to assess client network environments. Here are some of my favorites, including a few lesser-known treasures.

The first Windows Phone 7 smartphones
Dell, HTC, LG and Samsung all unveiled smartphones running the Windows Phone 7 OS. In the United States, the GSM phones will be available on AT&T and T-Mobile beginning in November. (CDMA phones, such as the HTC 7 Pro on Sprint, will be available in first half of 2011.) Here's a first look at the new phones. Has Microsoft been successful with its mobile overhaul?

MOST-READ STORIES

  1. Comcast begins DNS security rollout
  2. The world's coolest data centers
  3. Bathroom tech: From strange to ridiculous
  4. New malware technique targets intrusion-prevention systems
  5. Cisco's top 10 rivals
  6. Microsoft's anti-Zeus tool cleans quarter-million PCs
  7. Is Canonical going open core? Does it matter?
  8. Top 10 specialty Web browsers you may have missed
  9. Gap between IPv4 depletion, IPv6 adoption widens
  10. HP No.2 to Cisco in Ethernet port shipments

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment