Search This Blog

Friday, October 08, 2010

Prep for Record Onslaught of Microsoft Patches; A tech pro's greatest enemies

The technology pro's greatest enemies | 1 in 4 babies on Internet before they're born

Network World Compliance

Forward this to a Friend >>>


Prepare for Record Onslaught of Patches from Microsoft
Next Tuesday will be Microsoft's Patch Tuesday for the month of October. IT admins, consider this your advance notice to clear your calendar for next week and prepare to address a record-setting 16 security bulletins. Read More


WHITE PAPER: Vyatta

Vyatta Replacement Guide - Cisco
Comparison guide highlighting the dramatic price/performance differential between Vyatta software and appliances and the Cisco ISR, ASA and ASR product families. Read now!

WHITE PAPER: Iron Mountain

Are You Ready for Optimized Exchange Migration?
Download this exclusive tech dossier from Iron Mountain to learn why on-premise archiving can be the right choice for your Microsoft Exchange-hosted e-mail environment. Read Now.

The technology pro's greatest enemies
How to spot -- and take down -- the six most nefarious adversaries of IT Read More

1 in 4 babies on Internet before they're born
The average child has an online presence by the age of 6 months, thanks to their parents' Facebooking and other online activities, and nearly a quarter of kids make their Internet debut before they're even born. Read More

Media sites target of politically motivated DDoS attacks
A large Web hosting company in France is striving to protect the Web sites of its European media customers, which has meant fending off distributed denial-of-service attacks. The enduring pattern of these DDoS attacks suggests they are triggered by angry readers raging against political news that they don't like. Read More

Symantec Unveils Strategy to Protect Mobile Devices and Data
Recognizing that the technology landscape is shifting rapidly toward mobility, Symantec today unveiled new tools to help protect mobile devices, and the sensitive data they contain. The mobile security and management strategy from Symantec enables businesses, service providers, and users to manage and secure mobile devices no matter where they may roam. Read More


WHITE PAPER: Iron Mountain

Migrating to Exchange 2010
This white paper explores the issues that may arise when migrating to Exchange Server 2010 and how an email archiving solution can be an effective tool for making the move easier and more efficient. Read Now.

SAS 70 replacement
The often-misused SAS 70 auditing standard is set to be replaced next year by SSAE 16. Read More

How to Keep Your Kids Safe on Facebook
Boasting 500 million users worldwide and still growing, Facebook is now ubiquitous. Because of its popularity, minors have jumped onto the social media bandwagon, too, and they use networking the same way adults do--to share pictures, connect with friends, organize events, and play social games. And that can be a problem. Read More

In Security Outsourcers We Trust
The push to shrink security staff means more companies are outsourcing security functions to MSSPs, according to this year's Global Information Security Survey. Read More

Software security for developers
Secure software development means consideration in every phase. Here are 9 key software security principles plus practical advice from a developer's point of view. Read More


WEBCAST: CA

Managing Service Quality Across the Infrastructure
With zero tolerance for latency of web applications and a near total dependence on technology in the workplace as the norm, an unpredictable and unreliable infrastructure is too big a risk for today's speed of business. View Now

Microsoft pitches PC isolation ward to defeat botnets
Microsoft's security chief pitched a plan that would block some botnet-infected computers from connecting to the Internet. Read More

McAfee introduces antivirus product for virtual environments
McAfee has introduced software to help companies moving to desktop virtualisation to remain secure Read More

Facebook takes on privacy with new tools
After taking a beating from users over privacy issues this year, Facebook got the message and gave users more control over their information. Read More

Why a "Sandbox" Makes Adobe Reader More Secure
Adobe released a major security update for Adobe Reader and Acrobat yesterday--a week ahead of the quarterly release scheduled for next Tuesday. At the same time, Adobe provided a glimpse at how "sandboxing" in the upcoming Adobe Reader Protected Mode will help prevent exploits even when vulnerabilities exist. Read More

Waging crypto wars 2.0
I was drawn to security in the early 90s during the crypto battle against the U.S. government, which was trying to force companies to adopt broken encryption with built in backdoors, like the failed Clipper Chip. Fortunately, the crypto wars were won by the side of reason, not least because of activists hoarding crypto technology in offshore locations. Read More

Fake browser warnings dupe users into downloading 'scareware'
Scammers are spoofing the anti-malware warnings of popular browsers to dupe Windows users into downloading fake security software, according to Symantec. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

Ig Nobel honors world's wackiest researchers: 2010 winners
The 20th annual Ig Nobel Prizes were awarded Thursday night for "achievements that first make people laugh, and then make them think." The prizes commemorate the world's funniest research, and sometimes the world's biggest villains (BP is a winner this year). Here's a list of the 2010 prizes.

Eight hot commercial space projects
The recently passed NASA Authorization Act of 2010 was generally seen as a huge nod toward developing commercial space projects. NASA Administrator Charles Bolden said the authorization "launches a commercial space transportation industry." Indeed there are a number of interesting commercial space projects underway.

MOST-READ STORIES

  1. Top reason for Facebook unfriending: Too many useless posts
  2. Tech CEOs tell U.S. gov't how to cut $1 trillion from deficit
  3. Cisco unveils Umi home videoconferencing
  4. Verizon steals Clearwire's 4G thunder
  5. Can large scale NAT save IPv4?
  6. Microsoft pitches PC isolation ward to defeat botnets
  7. iPhone vs. original Mac: A teardown showdown
  8. Cisco's Borderless Networks vs. HP's Converged Infrastructure
  9. Microsoft, Citrix and Wipro partner to outsource virtual desktops
  10. Most Windows 7 upgrades taking place in next 12 months

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: