TOP STORY: Apple iPhone, iPad secrets part of FBI insider info theft bust FBI/DOJ allege insider info passed along from Apple, Dell and AMDThe FBI and Department of Justice today busted four current and former executives from a variety of companies - Dell, AMD, Flextronics and Taiwan Semiconductor Manufacturing Company - and charged them with insider trading. The information was used to bolster investment opportunities as part of their consultant gigs at investment firm Primary Global Research. A fifth defendant has already been charged... Read More E-BOOK: Get the "Next-Generation Firewalls for Dummies" Book (Palo Alto Networks) This book provides an overview of next-gen firewalls. Get your copy to find out: How Enterprise 2.0 applications create new risks for your organization? Why traditional firewalls can't protect your network? How next-generation firewalls stand apart from other security solutions? Click to continue | Hackers get Ubuntu Linux booting alongside Google's Chrome OS Dual-booting on Chrome OS? Yes, but not for the faint of heartI've been testing out a prototype of Google's Chrome OS laptop for about a week now, and while I love certain things about the device my mind keeps coming back to the fact that it would be so much nicer if it could boot a "real" operating system as well. Read More OpenBSD back door claim now in doubt The claim that the FBI planted a backdoor in OpenBSD a decade ago has been flatly denied by developer protagonists named as having been involved in the conspiracy in an email sent to OpenBSD founder, Theo de Raadt. Read More WHITE PAPER: The Three Ps of Evaluating Managed Network Services (Qwest) To reduce costs and keep IT resources focused on the core business, more organizations are choosing to outsource network management. To deliver on this promise, it's essential to choose the right service provider. This in-depth report explores the key considerations, including solution portfolio, partnerships and processes. Read now! | WikiLeaks and Cyber Security How could this have happened and what does it say about cyber security vulnerabilities?There's been a lot written about WikiLeaks over the past few weeks -- some of it fair and some a bit off base. No question that there was a security breach related to classified documents ending up on WikiLeaks but it is important to dig a bit further to define what may have gone wrong. Here are the elements of security involved and where a breakdown may have occurred: Read More US Dept. of Commerce: New online privacy rules needed The U.S. Department of Commerce recommends a new privacy bill of rights and an enforceable privacy code of conduct for online firms. Read More WHITE PAPER: Eleven Habits for Highly Successful BPM Programs (IBM) This guide outlines 11 habits for utilizing BPM effectively. Learn how to set up and manage a successful BPM program for company-wide process improvement. Prepare your organization for BPM success with the 11 tips in this paper. Read Now | More censorship, data breaches and devices: Security predictions for 2011 This past year has been a doozy in the security world. We kicked off the year by discovering operation Aurora, saw the first national-industrial sabotage attack with Stuxnet and are closing the year with Wikileaks about to become a constitutional crisis between the First amendment and a 1917 espionage law. Reality has well and truly become weirder than fiction. Read More Microsoft's holiday bonus: Fixes for 40 flaws Microsoft today patched 40 vulnerabilities in Windows, Internet Explorer (IE), Office, SharePoint and Exchange, including nine pegged "critical." Read More WHITE PAPER: E-mail: Today's Problems and How to Deal With Them (Symantec) As e-mail use balloons, IT faces looming archiving, management and security challenges. In these articles, Network World and its sister publications CIO, Computerworld and CSO explore how business users and IT alike can stay on top of the e-mail morass. Read now! | Huge EFF Win: Fourth Amendment Protects Email Privacy The U.S. Appeals Court ruled that stored email is protected by the Fourth Amendment. This federal decision will hopefully urge Congress to update the law so when the feds secretly demand a user's email, but do not have probable cause, an email provider can safely say, "Oh yeah? Come back with a warrant."In a tremendous landmark decision, the U.S. Appeals Court ruled that stored email is protected by the Fourth Amendment. Read More |
No comments:
Post a Comment