TOP STORY: Microsoft in major Security Essentials 2.0 overhaul After a mysteriously quiet launch late last week, Microsoft has released version 2.0 of its free Security Essentials (MSE) antivirus client. Read More WHITE PAPER: The Three Ps of Evaluating Managed Network Services (Qwest) To reduce costs and keep IT resources focused on the core business, more organizations are choosing to outsource network management. To deliver on this promise, it's essential to choose the right service provider. This in-depth report explores the key considerations, including solution portfolio, partnerships and processes. Read now! | Need A Job? Try Information Security Many enterprise organizations need help and will be hiring in 2011If you are an out-of-work IT person looking for your next challenge, I have a suggestion: Go study information security and pursue some sort of certification like a CISSP. According to ESG Research, 22% of mid-market (i.e. 500-1000 employees) and enterprise (i.e. 1000 employees or more) believe that they have a problematic shortage of information security skills within their IT organizations. Furthermore,... Read More What does NASA's CIO want for Christmas? NASA CIO wants an all powerful smartphone, help with NASA LAN and a cool shower cap?It seems that NASA CIO Linda Cureton has a pretty good sense of humor. On her NASA blog over the weekend she sent a letter to Santa about what she'd like to get for Christmas. While she'd obviously like to get better networking gear, I found shower cap item a little disturbing. Read More WHITE PAPER: Protecting personally identifiable information (Sophos) Virtually every organization acquires, uses and stores personally identifiable information .This white paper examines the challenges organizations face and the steps they can take to protect themselves and their customers against data breaches and ensure the safety of this sensitive information. Read Now | Disconnect: Take Control of the Data You Share With Digg, Twitter, Google Interview with former Google engineer Brian Kennish who created Disconnect to tackle the problem of search tracking. Disconnect helps protect your privacy by allowing you to take control of the data you share.Most users unintentionally send their name and other personal information along with their browsing and search history to third parties and search engines whenever they are online. Many of us have provided private details when creating accounts at sites such as Digg, Facebook and Twitter (real name, email, birthday, location, etc); when you combine all the information you gave them with any searches... Read More WiFi Vulnerabilities: Advances and incidents in 2010 The 802.11n standard was ratified in 2009 and WiFi really took off in 2010, with support showing up in an array of consumer electronic devices. Unfortunately security related issues escalated right along with growing acceptance. Here's a look back at the WiFi security issues that emerged this year. Read More WEBCAST: Choosing Enterprise Firewall for 2011 & Beyond (Palo Alto Networks) Firewalls are evolving. Application visibility and control has made its way to the forefront of the requirements list for enterprise firewalls. We are dedicating this episode of 60 Minutes with Nir Zuk to the more practical considerations around choosing an enterprise firewall. Learn more! | After hack, Gawker CTO outlines security changes Gawker Media's CTO has outlined a series of security changes designed to shore up the company's IT operations following an attack last week that compromised up to 1.4 million accounts. Read More Free speech issues: Controlling content in college newspapers If a corporation or a university owns a newspaper or a newsletter in which students are invited to write, nothing in law inhibits the exercise of complete control over what is published. In a corporate context, such total control makes a great deal of sense. Corporate reputation and brand image are important issues that reasonably take precedence over personal expression. Read More WHITE PAPER: Combating Security and Compliance Challenges (Quest Software) Don't wait for a security breach or compliance issue to damage your company. Ongoing monitoring can proactively identify and reduce threats. Learn how you can successfully stop security issues before they become serious problems. Read More | WikiLeaks Triggers IT Security Angst Security gaps could make businesses vulnerable to the same types of unauthorized disclosures plaguing the U.S. Department of State. Read More |
No comments:
Post a Comment