Tuesday, May 17, 2011

Securing Google Apps: A CIO Q&A

Windows scareware fakes impending drive disaster | Trust, respect and personal datastores

Network World Security

Forward this to a Friend >>>


Securing Google Apps: A CIO Q&A
Boston-based Bay Cove Human Services is a non-profit organization that offers assistance and service to 4,000 people and families in Massachusetts. CIO Hilary Croach has several technology challenges to contend with. For starters, the agency has its hands in a number of service areas, including helping individuals with developmental disabilities, mental illness, drug and alcohol addiction, and those who need support with aging. With about 140 locations around Eastern Massachusetts, Bay Cove's employees and IT operations are scattered. Read More


WHITE PAPER: Dell

The Business Case for Security Information Management
It is a mistake to assume that information security is solely a technical problem left for IT to solve. This guide is a non-technical discussion of security information management. Learn more.

WEBCAST: CA Technologies

Is Your DR Plan Truly Reliable?
No matter how you define a disaster, you need a strategy that provides protection, fast recovery and high availability of your systems, applications and data. Attend this webcast to learn about disaster recovery best practices and the wide range of technologies available to protect your organization. Learn More

Windows scareware fakes impending drive disaster
Scammers are trying to trick Windows users into paying to fix bogus hard drive errors that have apparently erased important files, a researcher said today. Read More

Trust, respect and personal datastores
On the final day of last week's European Identity Conference (EIC) I sat in on a workshop/presentation of the new Respect Trust Framework, which is being billed as a new approach to giving individuals control over their personal data shared over the Internet and mobile phone networks. Read More

Opening the door doesn't mean giving away the keys
This is one of those topics that everyone has an opinion about.  To state the thesis directly, everyone wants DBAs to have an open-door policy when it comes to their processes.  Of course to them, having an open-door means giving them the keys so they can look around for themselves.  And I understand their need to know what's going on with their app. Read More


WHITE PAPER: Aerohive

SLA Compliance: Wireless Fidelity Achieved
Aerohive delivers the next level in network visibility and reactive response with a new infrastructure-side performance monitoring and response system: SLA Compliance. Read now!

Thanks to ID thieves, your child may have more debt than you
Did you know that while you may still be considering a name for your precious bundle of joy, someone may have already stolen your unborn babies identity and racked up thousands in debt? Thanks to software which predicts social security numbers, identity thieves can steal a baby's social security number before the child is even born. In fact, if you have or will have any children who were born before... Read More

The CEO and his hardware token: A lesson learned
Let me tell you a story. It has everything a gripping tale needs – conflict, a power struggle and a gripping climax. Best of all, it's loosely based on true accounts – could this be your story? Read More

Experts: Small firms can take steps to improve cybersecurity
Small businesses can protect themselves against cyber threats, security experts say. Read More


WHITE PAPER: BMC Software

Why BMC is the ITSM Market Leader
Some vendors may force you to make difficult upgrades. Not us. BMC offers Rapid Results implementation services and BMC Remedy OnDemand, a SaaS version of the industry-leading IT Service Management suite. Read more to learn the top reasons why BMC Remedy offers true ITSM with out-of-the-box ease. Read More Today!

Livedrive, cheap unlimited online backup
Do you remember CompuServe? Back in the day, by which I mean before the beginning of life as we know it ... by which I mean before everyone and his brother got online, CompuServe was "it". In fact, CompuServe, which started in 1969, was actually the first online service offering bulletin boards, chat services, and file archives via dial-up service. Read More

White House releases new cyberspace strategy
The U.S. White House pushes for privacy and security in a new cybersecurity strategy. Read More

Integrated identity management: How to get it?
We tried an experiment at the recent Kuppinger-Cole European Identity Conference called a "World Cafe." This is an "un-conference" style session with open-ended discussion among the participants centered around a specific area. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

So you think you know networking?
Network World has been around now for 25 years, and in that time the technology it covers has changed dramatically. It's been quite a ride. Here's a brief quiz to test your knowledge of some of what's been happening over that time.

MOST-READ STORIES

  1. Thanks to ID thieves, your child may have more debt than you
  2. Microsoft's open source love-in expands with CentOS Linux support
  3. Bringing IT back home: 10 prime locations for onshore outsourcing
  4. Comcast rolls out metro Ethernet
  5. Chromebook: Are you really ready to marry Google?
  6. HP picks up USB 3.0 over Intel's Thunderbolt for desktops
  7. Is OpenFlow a go?
  8. Rumours fly about massive Cisco layoffs
  9. Cisco VoIP phones part of security weakness demo
  10. Microsoft kicks off Tech-Ed with license and virtualization upgrades

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment