Search This Blog

Friday, November 05, 2010

Microsoft: Cloud services hampered by unclear data rules

Google quashes 12 Chrome bugs, gives users early Flash fix | Don't be an application bigot

Network World Security

Forward this to a Friend >>>


Microsoft: Cloud services hampered by unclear data rules
The patchwork of rules across Europe regarding the handling of data poses a hurdle for Microsoft's efforts to provide cloud-based services, a senior Microsoft attorney said on Thursday. Read More


WEBCAST: Aruba Networks

Managing a Global Wireless LAN-Best Practices from Intel IT
In this webinar, Intel IT explains how they overcame challenges associated with managing their global WLAN across 150 Intel sites in 63 countries, supporting more than 45k simultaneous users every day. Intel highlights best practices for managing a global WLAN and how they cut support costs. Learn more!

WHITE PAPER: HP

Framework for Securing Virtualized Data Centers
Does the broad adoption of virtualization make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments. Understand the real need for virtualized security solutions. Read Now

Google quashes 12 Chrome bugs, gives users early Flash fix
Google today patched 12 vulnerabilities in its Chrome browser, all of them rated as high-level threats by the company's security team. Read More

Don't be an application bigot
Many security decisions and acceptable use policies are based on a false categorization of applications. "Business applications" are good, safe and have business value. "Personal applications" are bad, unsafe and have no business value. Read More

Protect your photo rights online
A big part of the joy of photography is sharing your images with others. The Internet has made it easy to instantly show your shots to friends, family, and even people you don't know. Many photographers post their work to Facebook, Flickr, Picasa, photography forums, or their own blogs and websites. Read More


WHITE PAPER: Cisco Ironport Systems

Cloud Security - Hurdles and Misconceptions
Computing is inevitably moving to the cloud, as is security. A recent poll among IT managers reveals that companies are either using or considering cloud-based security. This report looks at their reasons for doing so, and some hurdles or misconceptions that must be overcome. Read now!

Financial services firms expand online fraud defense
As guardians of wealth, financial-services firms have always been a high-value target for cybercrime, and with online banking and trading, banks find they have to work harder than ever to safeguard their operations. Read More

Microsoft slates first critical fix for Office 2010 next week
Microsoft today said it will ship three security updates next week to patch 11 vulnerabilities, including the first in Office 2010 pegged "critical." Read More

The "kill switch" for Windows Phone 7 apps
Microsoft outlines how it can "take action" against WP7 malware, offending appsMicrosoft has acknowledged that it has tools in place to "take action" against Windows Phone 7 malware or offending apps. Read More


WHITE PAPER: Array Networks

Get Control of Your Datacenter
Application Delivery Controller helps IT leverage data center technologies to quickly adapt to changing business demands. Read now!

SETI astronomers expand extraterrestrial search
SETI astronomers haven't found extraterrestrials -- yet Astronomers with the search for extraterrestrial intelligence (SETI) project will this month will expand their coordinated outer space observations to include new five new stars in the hope of obtaining radio and laser signals from civilizations circling those targets. Read More

EU tests cyberwarfare defences in low-key simulation
States across Europe have today carried out the region's first ever cyber-attack 'desk simulation' designed to find weak spots in the way government organisations might behave if faced with the real thing. Read More

SecureMac claims to discover Boonana Trojan horse variant
SecureMac claims to have discovered a new variant of the Boonana Trojan horse - trojan.osx.boonana.b. Read More

USB devices play part in one out of every eight attacks
One out of every eight computer attacks is being made via USB devices targeting the Windows AutoRun function, according to security software firm Avast. Read More

Privacy advocates fear massive fed health database
Privacy groups have raised alarms over plans by the federal Office of Personnel Management to build a database that would contain information about the healthcare claims of millions of Americans. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

The Google Android Quiz
Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies
Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.

MOST-READ STORIES

  1. Microsoft warns of new Zero-day attack affecting IE 6,7,8
  2. Cisco rolls out social network monitoring software
  3. NASA takes cloud computing to Mars
  4. GPL conflicts with Apple's iTunes, don't ask, don't tell
  5. Father of Firesheep fires away after wild week in Wi-Fi security
  6. The 25 worst high-tech habits (and how to fix them)
  7. T-Mobile ad mocks iPhone 4 and AT&T
  8. Lock down your Android devices
  9. Complexity of IT systems will be our undoing
  10. Russian-Armenian botnet suspect raked in €100,000 a month

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: