Search This Blog

Friday, May 06, 2011

How to be an effective security buyer

25 geeky gifts for cool moms | 'WebDaV is bad,' says security researcher

Network World Compliance

Forward this to a Friend >>>


How to be an effective security buyer
In previous columns I have repeatedly emphasized the importance of interoperability and the danger of security fragmentation. Security is so fragmented that it is often hard to discern between hype and reality. Read More


RESOURCE COMPLIMENTS OF: Infoblox

7 Little Secrets of Network Compliance
Does your network team dread compliance mandates such as PCI, HIPAA, SOX, FERC, NERC? The stress, anxiety and wasted time distract your team from other strategic projects. Join an industry expert to learn best practices on how to avoid the most common mistakes and ensure real time compliance with more confidence and a single click. Enroll today.

WHITE PAPER: Quest Software

It's 9am. Do You Know What Your Directory is Doing?
In this new Quest Software white paper, you'll see how to get more information that native logging alone can't provide. See how you can get real time, centralized information, and how doing so maximizes Active Directory performance. Read More

25 geeky gifts for cool moms
Mother's Day gift guide: Jewelry, gadgets, textiles and more. Read More

'WebDaV is bad,' says security researcher
Should we hate WebDAV for security reasons? Read More

California's Do Not Track law takes a step forward
California is a step closer to getting the first Do Not Track legislation in the U.S., aimed at protecting Internet users from invasive advertising. Read More


WHITE PAPER: Aerohive

A Practical approach to Wireless 2.0
Creating "Wi-Fi that works" is a tall order given the breadth of client and application types, the speed and complexity of 802.11n, high-density environments, etc., controller-based vendors cannot live up to their promises of Ethernet-like determinism. Read now!

PlayBook security: How RIM aims to keep work and play separate
One of Research in Motion's biggest challenges in a world of the iPhone and Android has been how to keep its products fun and fresh while maintaining the high level of security its corporate users have come to rely on. Read More

Anonymous blames former victims for devising Sony PlayStation Network breach
Just as Sony all but accused the hacker group Anonymous yesterday with masterminding the breach of Sony's PlayStation Network, today Anonymous came up short of denying it infiltrated PlayStation Network but rather said others performed the attack with the intent of making Anonymous look bad. Read More

Microsoft plans critical update to Windows Server next week
Microsoft today said it will patch a critical bug in its Windows server software and two other vulnerabilities in PowerPoint, the presentation maker bundled with Office. Read More


WHITE PAPER: Coyote Point

Ensuring Disaster Recovery with Equalizer and Envoy
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geo¬graphic location or data center. See this and other independent product reviews available by clicking here. Read More

10 Biggest High-Tech Cover-Ups: Shut Up and Act Like Nothing's Wrong
Like any industry, high tech has its share of scandals. But they are invariably made worse by companies that react to bad news by hoping no one will notice. As the saying goes, it's not the crime, it's the cover-up that kills you. Read More

Microsoft, Juniper urged to patch dangerous IPv6 DoS hole
Security experts are urging Microsoft and Juniper to patch a year-old IPv6 vulnerability so dangerous it can freeze any Windows machine on a LAN in a matter of minutes. Read More

FBI warns that fake bin Laden video is a virus
The U.S. Federal Bureau of Investigation warned computer users Tuesday that messages claiming to include photos and videos of Osama bin Laden's death actually contain a virus that could steal personal information. Read More

Home Wi-Fi Network Security: 4 Ways to Avoid Big Trouble
The risks of not properly securing your home wireless network continue to increase. Consider the newest tales from the dark side then follow four steps to stronger Wi-Fi network security. Read More

NY Yankees staffer accidentally e-mails customer list
A customer service representative with the New York Yankees accidentally e-mailed out personal details on close to 18,000 season ticket holders, the baseball team said Thursday. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a 5-day Microsoft Licensing Tricks class teaching negotiation tips; a Polycom system. From Cisco Subnet: 15 copies of Cisco Unity books. Enter here.

SLIDESHOWS

Fave raves: 22 IT pros name their favorite products
We asked, and IT pros answered. Their favorite IT products keep people productive and enterprise assets safe. Check out the list.

MOST-READ STORIES

  1. Apple iPad or BlackBerry PlayBook for the enterprise?
  2. Microsoft, Juniper urged to patch dangerous IPv6 DoS hole
  3. DARPA to build futuristic space exploration organization
  4. Anonymous not off the hook for Sony attack
  5. Red Hat bashes Microsoft, VMware
  6. New Wi-Fi gear aims to wipe out Ethernet edge switches
  7. Former MySQL boss: Code 'in better shape than ever'
  8. Noted iPhone hacker reportedly jailbreaking iPad 2
  9. Is Defective by Design getting any traction at all?
  10. RIM says it will open up BES

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: