Search This Blog

Tuesday, May 17, 2011

Cisco VoIP phones part of security weakness demo

Securing Google Apps: A CIO Q&A | Trust, respect and personal datastores

Network World Security Strategies

Forward this to a Friend >>>


Cisco VoIP phones part of security weakness demo
Cisco reaching out to AusCERT 2011 conference and speakers, Microsoft included in VoIP security weakness demo Read More


WHITE PAPER: Brocade Communications Inc.

Mythbuster on Deploying Virtualization Technology
When it comes to creating a private cloud, server virtualization is only one piece in the puzzle. Discover the missing pieces and assess your readiness to delivering cloud computing in a new whitepaper. This paper, from Forrester and Brocade, reveals where to invest your IT budget in order to achieve a private cloud. Learn more!

WHITE PAPER: BMC Software

Answers to Tough Questions about SaaS
When it comes to Software as a Service, opportunities abound for improved and simplified IT Service Management. With solutions like BMC Remedy OnDemand, organizations can cut costs, advance ITSM and simplify upgrades. If you're considering the move to SaaS, read this list of common questions. Learn More Today!

Securing Google Apps: A CIO Q&A
Boston-based Bay Cove Human Services is a non-profit organization that offers assistance and service to 4,000 people and families in Massachusetts. CIO Hilary Croach has several technology challenges to contend with. For starters, the agency has its hands in a number of service areas, including helping individuals with developmental disabilities, mental illness, drug and alcohol addiction, and those who need support with aging. With about 140 locations around Eastern Massachusetts, Bay Cove's employees and IT operations are scattered. Read More

Trust, respect and personal datastores
On the final day of last week's European Identity Conference (EIC) I sat in on a workshop/presentation of the new Respect Trust Framework, which is being billed as a new approach to giving individuals control over their personal data shared over the Internet and mobile phone networks. Read More

Opening the door doesn't mean giving away the keys
This is one of those topics that everyone has an opinion about.  To state the thesis directly, everyone wants DBAs to have an open-door policy when it comes to their processes.  Of course to them, having an open-door means giving them the keys so they can look around for themselves.  And I understand their need to know what's going on with their app. Read More

Thanks to ID thieves, your child may have more debt than you
Did you know that while you may still be considering a name for your precious bundle of joy, someone may have already stolen your unborn babies identity and racked up thousands in debt? Thanks to software which predicts social security numbers, identity thieves can steal a baby's social security number before the child is even born. In fact, if you have or will have any children who were born before... Read More


WHITE PAPER: Quest Software

It's 9am. Do You Know What Your Directory is Doing?
In this new Quest Software white paper, you'll see how to get more information that native logging alone can't provide. See how you can get real time, centralized information, and how doing so maximizes Active Directory performance. Read More

Windows scareware fakes impending drive disaster
Scammers are trying to trick Windows users into paying to fix bogus hard drive errors that have apparently erased important files, a researcher said today. Read More

The CEO and his hardware token: A lesson learned
Let me tell you a story. It has everything a gripping tale needs – conflict, a power struggle and a gripping climax. Best of all, it's loosely based on true accounts – could this be your story? Read More

Experts: Small firms can take steps to improve cybersecurity
Small businesses can protect themselves against cyber threats, security experts say. Read More

Top 5 things to do before buying more security technology
Las Vegas --Throwing more technology at security threats as they crop up is not the best way to go if the goal is to protect the most valuable data at the best price, attendees at Interop were told this week. Read More


WEBCAST: Oracle

How Oracle Exalogic and Exadata Deliver Extreme Java
View this webcast to learn why Exalogic and Exadata are the definitive engineered platforms for enterprise application and database consolidation, with added advantage of extreme Java and database performance, unmatched reliability and scalability, and cloud-enabling elastic capacity. Register Today!

Facebook Combats Spam, Clickjacking With Four New Features
One day after Symantec uncovered an alleged privacy breach, Facebook released four new features to its security suite, unrelated to the discovery. Read More

Cloud-based security as a service: It's catching on and here's why
When technology manager Lincoln Cannon wants to give his company's employees and business partners controlled access to various internal resources or cloud-based services the company uses, he goes to one cloud-based single sign-on security service to assign access privileges. Read More

Do-not-track me!
In just one week, privacy advocates have seen two major proposals to promote consumer privacy on the Internet. In California, SB-761, a "Do-Not-Track" bill regulating tracking cookies, passed through committee clearing a major hurdle to adoption. Simultaneously, Sen Rockefeller introduced a very similar bill in the US Senate. Both bills would require companies to honor a "Do-Not-Track" preference set by consumers, usually as a browser setting. The bills represent a significant step forward in online privacy and should be strongly supported by voters. Read More

Windows 7's malware infection rate climbs, XP's falls
Data released today by Microsoft showed that Windows 7's malware infection rate climbed by more than 30% during the second half of 2010, even as the infection rate of the 10-year-old Windows XP fell by more than 20%. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

So you think you know networking?
Network World has been around now for 25 years, and in that time the technology it covers has changed dramatically. It's been quite a ride. Here's a brief quiz to test your knowledge of some of what's been happening over that time.

MOST-READ STORIES

  1. Cisco VoIP phones part of security weakness demo
  2. Rumours fly about massive Cisco layoffs
  3. iPhone 5 rumor roundup for week ending May 13
  4. Is WiMax dead or thriving?
  5. Patching Windows is a major time sink for IT departments
  6. Computer glitch forces U.S. to cancel visa lottery results
  7. Rebuild the system databases - Practice makes perfect!
  8. Is OpenFlow a go?
  9. 6 best Android Honeycomb tablets you can buy now
  10. Google launches Chrome OS, says Windows is 'torturing users'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: