Search This Blog

Monday, December 20, 2010

What do NASA changes and IT security issues have in common?

More censorship, data breaches and devices: Security predictions for 2011 | Remains of the Day: Crime doesn't pay

Network World Security


TOP STORY: What do NASA changes and IT security issues have in common?
Taking a look at what stories were hot in 2010 As I wrap up the year and look at the top posts it's obvious that space and IT security news have been the hottest stories.  NASA's new Sun-watching satellite was the top story but there was plenty of other NASA news in this transitional year for the agency. On the IT security front, there were a variety of interesting items in the encryption and botnet areas.  In order of popularity, these are the... Read More

WHITE PAPER: The Three Ps of Evaluating Managed Network Services (Qwest)
To reduce costs and keep IT resources focused on the core business, more organizations are choosing to outsource network management. To deliver on this promise, it's essential to choose the right service provider. This in-depth report explores the key considerations, including solution portfolio, partnerships and processes. Read now!

More censorship, data breaches and devices: Security predictions for 2011
This past year has been a doozy in the security world. We kicked off the year by discovering operation Aurora, saw the first national-industrial sabotage attack with Stuxnet and are closing the year with Wikileaks about to become a constitutional crisis between the First amendment and a 1917 espionage law. Reality has well and truly become weirder than fiction. Read More

Remains of the Day: Crime doesn't pay
Apple aims to simplify the process of buying a Mac, one kid learns the hard way that stealing is bad, and we're shocked--shocked!--to find that there's insider trading going on here. The remainders for Thursday, December 16, 2010 are treading the straight and narrow. Read More

WHITE PAPER: Securing Web Presence with DNSSEC (F5 Networks)
This article discusses DNSSEC , a series of DNS protocol extensions which ensure the integrity of data returned by domain name lookups by incorporating a chain of trust into the DNS hierarchy. Read now!

Pro-WikiLeaks DDoS reprisals overrated, says expert
Headlines to the contrary, the WikiLeaks hacktivist attacks against Visa, MasterCard, PayPal and others last week were relatively small and disorganized, a security expert said. Read More

Google adds site hacking notifications in search results
Google has started notifying its search engine users of sites in their list of query results that may have been compromised by hackers. Read More

WHITE PAPER: Frost & Sullivan Internal Segmentation (PacketMotion)
Internal Segmentation has been a growing trend over the last ten years. These solutions control data within the corporate network and actively enforce data access policies for internal staff and systems. This white paper outlines Internal Segmentation, and the benefits of using PacketSentry for Virtual Segmentation. Read now!

U.S. trade report blasts China over high-tech policies
The U.S. and other countries are getting slammed by China's intellectual property rights infringements and standards-setting processes, according to an investigative report issued by the U.S. International Trade Commission (US ITC) this week. Read More

10 Great Gifts and Gadgets to Spruce Up Your Work Cubicle
Our guide to the coolest cubicle accessories has everything you could want, from USB-powered fragrances to in-office gardens. Read More

WHITE PAPER: Bailing Out Your Budget: How to Lower Your TCO (Websense, Inc.)
The Websense® TRITON™ solution is a unified content security solution that not only delivers better protection against modern threats but also does so with the lowest total cost of ownership (TCO). Read More

The 20 Biggest Tech Failures of 2010
You can't appreciate the highs without looking at the lows. Here are 20 of this year's biggest failures in consumer technology. Read More

Quiz: Are You a Tron Wizard?
Take our quiz, inspired by the opening of Disney's "Tron: Legacy" in December 2010 Read More


FILL OUT A SURVEY, GET REWARDED
Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

DECEMBER GOODIES FROM THE SUBNETS
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Best and worst celebrity technology moments of 2010
Here's a look back at the year's most memorable – for better or worse – celebrity moments in technology.

Top 15 Holiday Deals on Notebooks, Netbooks, and Desktops
Black Friday is gone, Cyber Monday is history, and Cyber Week is over, but the deals are still around--if you know where to look. The holiday shopping season is in full swing, and retailers are offering great computer discounts to fit everyone's budget. Take a look inside to find netbooks for $300, desktops with widescreen monitors for under $600, and 15-inch laptops starting at $400. Check it out.

MOST-READ STORIES

  1. Hackers get Ubuntu Linux booting alongside Chrome OS
  2. Google launches new 'Body Browser'
  3. Dropbox updated to 1.0, brings selective sync to masses
  4. Analyst expects Apple to sell up to 20 million iPhones on Verizon
  5. Apple updates AirPort Utility, base station firmware
  6. Tablet wars of 2011: The battle looms
  7. Is iOS jailbreaking an enterprise security threat?
  8. Hacker tool Metasploit now targeting Cisco network gear
  9. Microsoft teams with Apple, Oracle, EMC on 882 Novell patents
  10. Brief Facebook outage causes slight panic

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter



You are currently subscribed to networkworld_security_alert as security.world@gmail.com.
Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


2 comments:

Anonymous said...

In that locatiοn are severаl modeѕ or typeѕ οf gamеs οn many іnteгestіng аnd attгaсtіve aspeсts, Whіle thеy Toу
оnlinе games. Una vez que el jugador hаya рlay Loosе online games that is o.
κ., уоu shοuld Nevеr be chargеd to pay
at all on thеse ѕites.

Also visit my blog Game

Anonymous said...

Learn from your desktop: No need to travel distances to reach a classroom of hundreds and learn English.
Write this on the board every day for the first two weeks:
' I am ' You are ' He is ' She is ' It is ' We are
' They are. The educational system in Saudi Arabia is an issue only discussed and decided by its royal rulers.

Here is my site: cach hoc tieng anh