Monday, November 01, 2010

IPad Enterprise Invasion and Security Risks

Banks' poor security forces 'one-in-ten' customers to switch | What Your Business Can Learn from Russia

Network World Security

Forward this to a Friend >>>


IPad Enterprise Invasion and Security Risks
Enterprise IT has had no choice but to deal with iPads as they walk through the front door being carried by executives. But one mobile apps expert says the iPad wouldn't have passed last year's enterprise security requirements. Read More


WHITE PAPER: Symantec

Information Protection Survey Small Mid Business
The SMB Information Protection survey sheds light on the risks SMBs are facing, what they are doing about it and how much it is costing them. Read this report to learn the simple steps SMBs can take to improve their information protection footing. Read Now.

WEBCAST: Bradford Networks

Step-by-Step Process to Network Security
Hear from one financial services IT pro who thought his network was completely secure until it failed an internal security audit. Tim Childress from the credit card division of Bridgestone discusses the unique approach he took to improve network security. Hear how he met his objectives to stop rogue devices, gain better network visibility. View now

Banks' poor security forces 'one-in-ten' customers to switch
Nearly one-in-ten customers have switched banks or retailers because of unhappiness over the way they have handled their identity or privacy, according to the bi-annual Unisys Security Index. Read More

What Your Business Can Learn from Russia
"Freedom" may not be a concept that's historically associated with Russia, but as for technology, the federation will soon be far freer than many businesses can even imagine--free from Windows, that is, and its legacy of high costs, malware, and perpetual hardware upgrades. Read More


WHITE PAPER: HP

Virtualizing Network Connections and Capacity
Read this whitepaper to learn how HP FlexFabric can provision your network resources efficiently and securely to accelerate deployment of virtualized workloads. Read Now

Report: Internet still bearer of cyberthreats in the APAC
The Internet remains the most common source of uninvited threats to people's computers. But other devices have recently opened up to other cyber threats as well with new threats being discovered in the last quarter, according to the latest report by Trend Micro. Read More

Watching orbital objects: Air Force Space Fence project moves forward
Air Force Space Fence is expected to help monitor, prevent space debrisThe Air Force this month said it was looking to award up to two preliminary design contracts worth up to a total of $214 million for development of the Space Fence which ultimately will help protect Earth by detecting Read More


WHITE PAPER: Cisco Ironport Systems

Cloud Security - Hurdles and Misconceptions
Computing is inevitably moving to the cloud, as is security. A recent poll among IT managers reveals that companies are either using or considering cloud-based security. This report looks at their reasons for doing so, and some hurdles or misconceptions that must be overcome. Read now!

BitDefender rolls out beta version security app for Facebook
Internet security vendor BitDefender has unveiled a beta version of its application for Facebook called safego. Read More

Security firms differ on severity of new Mac malware threat
While a new piece of Mac malware is on the prowl, the threat it poses may be overblown, according to one security firm. Read More

IT worker gets prison after stealing data for online surveys
A former IT staffer has been sentenced to a year and a day in prison for stealing sensitive information belonging to his co-workers and using the data to make money filling out online health surveys. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

The Google Android Quiz
Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies
Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.

MOST-READ STORIES

  1. Hey, you with the open Wi-Fi: You're an idiot
  2. Microsoft considering encryption for Bing
  3. iMoby: the hunt for the great white iPhone
  4. Steve Jobs' business card from 1979
  5. 89,000 Microsoft employees to get a Windows Phone 7 handset
  6. Microsoft puts Windows Server instances in the cloud
  7. Nightmare robots: 20 real and creepy Androids
  8. Ubuntu moves away from GNOME
  9. Cell phone-toting time traveler exposed? Yeah right!
  10. Microsoft giving away Windows Phone 7 phones

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment