Monday, October 11, 2010

Prepare for Record Onslaught of Patches from Microsoft

Android Hack Enables 3G Skype Calls | The US offshore wind energy technology conundrum

Network World Security

Forward this to a Friend >>>


Prepare for Record Onslaught of Patches from Microsoft
Next Tuesday will be Microsoft's Patch Tuesday for the month of October. IT admins, consider this your advance notice to clear your calendar for next week and prepare to address a record-setting 16 security bulletins. Read More


REPORT: Radiant Logic, Inc

Download Latest Gartner Report on IdM
Today's centralized identity infrastructure can't keep up with tomorrow's increasingly federated demands, from user-centric identity, to Identity-as-a-Service, and the cloud. In "The Emerging Architecture of Identity Management," Gartner outlines a vision for tomorrow's identity landscape-one with virtualization at its core. Download the report-free!

WHITE PAPER: NetApp

Storage for Windows Environments
This paper discusses how consolidating your Microsoft SQL Server, Exchange, and SharePoint Server data along with your Windows files using NetApp storage for Windows environments reduces the cost of physical storage as well as ongoing management costs in Windows environments. Read More!

Android Hack Enables 3G Skype Calls
Just a few short days ago, the official Skype application finally graced the Android Market. But to much dismay, the communications app lacked the ability to make 3G calls on certain carriers within the US. Read More

The US offshore wind energy technology conundrum
US could see more then 4,000 GW of power from offshore windIf wind is ever to be a significant part of the energy equation in this country we'll need to take it offshore - into the deep oceans. Large offshore wind objects could harness about more than 4,000 GW of electricity according to a massive report on wind energy out this week from the Read More


WHITE PAPER: Watchguard

10 questions to ask before you buy an anti‐spam solution
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

Microsoft Proposes Each PC Needs A Health Certificate or No Net Access Allowed
Microsoft has proposed a plan that each PC would be required to present a "health certificate" or else be considered too sick to connect to the Internet.Many security experts have talked about quarantining infected computers, but Microsoft has proposed a plan that each PC would be required to present a "health certificate" or else be considered too sick to connect to the Internet. Read More

Facebook Quick Tip: Control Apps Access To Your Data
Facebook launched a new feature this week that gives you a detailed overview of the data permissions that you've granted to apps. Here's how to find the new dashboard and adjust your settings. Read More


WHITE PAPER: HP

SharePoint 2010 Q&A
This IDC Q&A document provides straightforward answers on frequent SharePoint questions. Read what IDC has to say about SharePoint's widespread adoption, where current implementations fall short, SharePoint's top collaboration challenges, when it makes sense to use a service provider, and best practices for SharePoint 2010 migrations. Read Now

Best practices for endpoint security, Part 2
To cyber thieves, endpoint devices are a tempting target. Such devices can be a treasure trove of sensitive information in their own right, but they are also the gateway to bigger targets like network servers, databases and applications. In this article, security experts Faycal Daira and Bob Foley offer even more of their best practices for endpoint protection. Last week we looked at antivirus, device control, and host-IPS and behavioral protections. This week we cover location awareness, network access control and application control. Read More

Physical security information management (PSIM): The basics
The concept that's become known as Physical Security Information Management (PSIM, pronounced P-sim) was introduced to the physical security world in 2006. The idea is that all the stuff of security is actually data. Data that, once contextualized and analyzed, becomes information for making better business decisions. It is applying the concepts of information management and business intelligence to the practices and technologies of physical and homeland security. Read More

Bill would protect towns, schools from cybertheft losses
U.S. Sen. Charles Schumer (D-N.Y.) has introduced a bill that would protect municipalities and school districts against financial losses resulting from certain types of cybertheft. Read More

Experts to debate 'Future of the Perimeter' in webcast
Two of the security industry's most serious thinkers are getting together on Tuesday in a Webcast to discuss and debate the "The Future of the Perimeter." Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

Ig Nobel honors world's wackiest researchers: 2010 winners
The 20th annual Ig Nobel Prizes were awarded Thursday night for "achievements that first make people laugh, and then make them think." The prizes commemorate the world's funniest research, and sometimes the world's biggest villains (BP is a winner this year). Here's a list of the 2010 prizes.

Eight hot commercial space projects
The recently passed NASA Authorization Act of 2010 was generally seen as a huge nod toward developing commercial space projects. NASA Administrator Charles Bolden said the authorization "launches a commercial space transportation industry." Indeed there are a number of interesting commercial space projects underway.

MOST-READ STORIES

  1. Tech CEOs tell U.S. gov't how to cut $1 trillion from deficit
  2. Apple iOS 4.1 "Greenpois0n" jailbreaks tool set for 10/10/10
  3. Microsoft proposes each PC needs a health certificate or no net access
  4. Report: Microsoft, Adobe CEOs meet to discuss Apple
  5. Microsoft: 16 security patches coming Tuesday
  6. IBM makes the mainframe young again
  7. Top reason for Facebook unfriending: Too many useless posts
  8. Prepare for record onslaught of patches from Microsoft
  9. Sprint CEO mum on plans for Phone 7 devices
  10. Cisco's umi gets panned

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment