Tuesday, December 21, 2010

Microsoft in major Security Essentials 2.0 overhaul

Need A Job? Try Information Security | What does NASA's CIO want for Christmas?

Network World Security


TOP STORY: Microsoft in major Security Essentials 2.0 overhaul
After a mysteriously quiet launch late last week, Microsoft has released version 2.0 of its free Security Essentials (MSE) antivirus client. Read More

WHITE PAPER: The Three Ps of Evaluating Managed Network Services (Qwest)
To reduce costs and keep IT resources focused on the core business, more organizations are choosing to outsource network management. To deliver on this promise, it's essential to choose the right service provider. This in-depth report explores the key considerations, including solution portfolio, partnerships and processes. Read now!

Need A Job? Try Information Security
Many enterprise organizations need help and will be hiring in 2011If you are an out-of-work IT person looking for your next challenge, I have a suggestion: Go study information security and pursue some sort of certification like a CISSP. According to ESG Research, 22% of mid-market (i.e. 500-1000 employees) and enterprise (i.e. 1000 employees or more) believe that they have a problematic shortage of information security skills within their IT organizations. Furthermore,... Read More

What does NASA's CIO want for Christmas?
NASA CIO wants an all powerful smartphone, help with NASA LAN and a cool shower cap?It seems that NASA CIO Linda Cureton has a pretty good sense of humor. On her NASA blog over the weekend she sent a letter to Santa about what she'd like to get for Christmas. While she'd obviously like to get better networking gear, I found shower cap item a little disturbing. Read More

WHITE PAPER: Protecting personally identifiable information (Sophos)
Virtually every organization acquires, uses and stores personally identifiable information .This white paper examines the challenges organizations face and the steps they can take to protect themselves and their customers against data breaches and ensure the safety of this sensitive information. Read Now

Disconnect: Take Control of the Data You Share With Digg, Twitter, Google
Interview with former Google engineer Brian Kennish who created Disconnect to tackle the problem of search tracking. Disconnect helps protect your privacy by allowing you to take control of the data you share.Most users unintentionally send their name and other personal information along with their browsing and search history to third parties and search engines whenever they are online. Many of us have provided private details when creating accounts at sites such as Digg, Facebook and Twitter (real name, email, birthday, location, etc); when you combine all the information you gave them with any searches... Read More

WiFi Vulnerabilities: Advances and incidents in 2010
The 802.11n standard was ratified in 2009 and WiFi really took off in 2010, with support showing up in an array of consumer electronic devices. Unfortunately security related issues escalated right along with growing acceptance.  Here's a look back at the WiFi security issues that emerged this year. Read More

WEBCAST: Choosing Enterprise Firewall for 2011 & Beyond (Palo Alto Networks)
Firewalls are evolving. Application visibility and control has made its way to the forefront of the requirements list for enterprise firewalls. We are dedicating this episode of 60 Minutes with Nir Zuk to the more practical considerations around choosing an enterprise firewall. Learn more!

After hack, Gawker CTO outlines security changes
Gawker Media's CTO has outlined a series of security changes designed to shore up the company's IT operations following an attack last week that compromised up to 1.4 million accounts. Read More

Free speech issues: Controlling content in college newspapers
If a corporation – or a university – owns a newspaper or a newsletter in which students are invited to write, nothing in law inhibits the exercise of complete control over what is published. In a corporate context, such total control makes a great deal of sense. Corporate reputation and brand image are important issues that reasonably take precedence over personal expression. Read More

WHITE PAPER: Combating Security and Compliance Challenges (Quest Software)
Don't wait for a security breach or compliance issue to damage your company. Ongoing monitoring can proactively identify and reduce threats. Learn how you can successfully stop security issues before they become serious problems. Read More

WikiLeaks Triggers IT Security Angst
Security gaps could make businesses vulnerable to the same types of unauthorized disclosures plaguing the U.S. Department of State. Read More


FILL OUT A SURVEY, GET REWARDED
Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

DECEMBER GOODIES FROM THE SUBNETS
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Best and worst celebrity technology moments of 2010
Here's a look back at the year's most memorable – for better or worse – celebrity moments in technology.

Top 15 Holiday Deals on Notebooks, Netbooks, and Desktops
Black Friday is gone, Cyber Monday is history, and Cyber Week is over, but the deals are still around--if you know where to look. The holiday shopping season is in full swing, and retailers are offering great computer discounts to fit everyone's budget. Take a look inside to find netbooks for $300, desktops with widescreen monitors for under $600, and 15-inch laptops starting at $400. Check it out.

MOST-READ STORIES

  1. Photographers are not terrorists
  2. Microsoft yanks Office 2007 update
  3. Downloads lighten your laptop
  4. ITU softens on definition of 4G mobile
  5. What's beyond 10G Ethernet?
  6. Is Cisco adding a storage array to UCS?
  7. 10 last-minute gift ideas for Linux geeks
  8. Google launches new 'Body Browser'
  9. Zuckerberg tours China's top search engine Baidu
  10. Private clouds: Not for the faint of heart

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter



You are currently subscribed to networkworld_security_alert as security.world@gmail.com.
Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment