Thursday, July 21, 2011

Accessible backups, not recursive backups

CTIA shares tips for preventing News Corp. (or anyone else) from hacking your voicemail | Microsoft patching: Still painful after all these years

Network World Security Strategies

Forward this to a Friend >>>


Accessible backups, not recursive backups
Recently my PGP Desktop encryption program suddenly lost its registration information. I don't know why, although it may have had something to do with a series of driver updates, but when the system rebooted at one point, I noticed a registration request from the encryption product. I didn't think much about it until I finished all the driver updates. At that point, I was ready to mount the PGP-encrypted volumes that contain confidential data such as Norwich University student records, client records, financial data and correspondence. Read More


WHITE PAPER: IBM

Delivering Information you can trust
This whitepaper rovides an overview of the current data quality problem and describes how IBM® InfoSphere® Information Server for IBM System z® can become your foundation for data quality and make a big difference in helping you derive more value from the complex, heterogeneous information spread across your systems. Read Now

WHITE PAPER: CA Technologies

CIOs Feel the Pressure to Optimize the Online Experience
In this exclusive survey, CIOs weigh in on the business impact of application performance. This white paper presents the survey results and offers guidance on building a business case to optimize the customer experience with consistently excellent application performance. Learn More

CTIA shares tips for preventing News Corp. (or anyone else) from hacking your voicemail
If you're concerned that Rupert Murdoch or anyone else might be snooping on your voicemails, never fear: the CTIA wireless association is here to help. Read More

Microsoft patching: Still painful after all these years
The spring of 2011 has seen some of the largest Microsoft Patch Tuesdays ever. In April, Microsoft tied its all-time record with 17 updates that fixed 64 vulnerabilities. In June, the company issued another biggie, with 16 updates that fixed 34 vulnerabilities. Read More

Cisco says layoffs, cost-cutting won't derail SecureX
Despite cutting 6,500 jobs and reducing operating expenses by about $1 billion, Cisco has affirmed that it has no intention of pulling back from its commitment to its new security architecture known as SecureX. Read More


WHITE PAPER: F5

ROI of Application Delivery Controllers
How modern offload technologies in Application Delivery Controllers can drastically reduce expenses in traditional and virtualized architectures, with a fast ROI. Learn More!

20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
From IT geeks winning millions to Google mush-brain syndrome, 2011 is shaping up to be one wacky year Read More

Taliban website, phones reportedly hacked
In the current wave of hacking incidents, the Taliban in Afghanistan is not immune, Wednesday saying its website and cellphones were hacked. Several reports say the hack resulted in what the Taliban says is false information being sent out that its leader, Mullah Mohammed Omar, is dead due to heart problems. Read More


WEBCAST: CA Technologies

Managing Service Quality Across the Infrastructure
With zero tolerance for latency of web applications and a near total dependence on technology in the workplace as the norm, an unpredictable and unreliable infrastructure is too big a risk for today's speed of business. View Now

LulzSec resurrected to attack Murdoch
The hacker group LulzSec came out of retirement Monday to hack Rupert Murdoch's The Sun website and threatened to reveal emails from Murdoch's News International. Read More

Shift to virtualized environments shaking up security practices
The move to almost fully virtualized computing environments is driving a fresh approach to security in the enterprise, according to information technology security managers applying controls for VMware and Microsoft Hyper-V. Read More

Will Your Business Data Be Safe In the Cloud?
It's scary out there in the cloud. Data thieves, hackers, criminals, they're all out there scouring the Internet around the clock for ways to get into your corporate networks so they can steal data from poorly protected businesses. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
From IT geeks winning millions to Google mush-brain syndrome, 2011 is shaping up to be one wacky year.

MOST-READ STORIES

  1. 15 incredibly useful (and free) Microsoft tools for IT pros
  2. 10 technologies that will change the world in the next 10 years
  3. Microsoft struggles to get Hyper-V drivers in Linux kernel
  4. Disappearing $69 iPad 2 triggers buyer outrage at Sears
  5. Google notices will warn search users of malware
  6. Cisco returns fire in war of words with HP
  7. FBI arrests 14 hackers, but Anonymous still sailing
  8. Napkins: Where cool data centers got their starts
  9. How dare Mercedes, Google exec use Apple's 'magical'?
  10. Google founders were talked out of ignoring user email

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment