Tuesday, July 12, 2011

Does your security policy reflect mobility and cloud security?

Did Harvard Researchers Breach Students' Privacy? | Development benefits, and security risks, of HTML5 'hybrid' mobile apps

Network World Security Strategies

Forward this to a Friend >>>


Does your security policy reflect mobility and cloud security?
Recently I was at a technical meeting and overheard a client say that even though this area had just recently suffered a great deal of damage from several tornados, businesses are still very reluctant to develop or test Disaster Recovery Plans (DRP) or Business Continuity Models (BCM). Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Remote Support for PCs, Macs, Tablets and Smartphones
Provide instant, on-demand remote support with LogMeIn Rescue. Without pre-installed software, quickly connect to PCs, Macs and smartphones anywhere in the world. Get in, solve the problem, and be done in a flash. Plus, Rescue's SaaS-based platform means free upgrades and zero maintenance. Try Rescue free, today.

WHITE PAPER: Quest Software

7 Keys to Making or Breaking Your Exchange Infrastructure
Are you getting maximum performance from your Exchange environment? See how to get full control - while simplifying maintenance. Read this Quest white paper. Read now!

Did Harvard Researchers Breach Students' Privacy?
When Harvard researchers aggregated Facebook data and supposedly anonymized it, then no one should have been able to identify those users. That was not the case, however, and the "privacy meltdown" caught Harvard researchers in a net of ethical turmoil. The right or wrong of data mining social networks for social-science studies is a bone of contention between privacy watchdogs and researchers. Read... Read More

Development benefits, and security risks, of HTML5 'hybrid' mobile apps
So-called hybrid mobile apps are a way to finesse the debate over whether native apps, written in a given language for a specific OS, or web apps, written in HTML5, CSS and Javascript, are best. A pair of well-written blogposts, neither of which are intended as a programmers' tutorial, highlight the emerging opportunities, and risks, of hybrid mobile apps. Read More

Cool iPhone space-watching apps
NASA, space shuttle launch, star gazing, space weather lead package of cool iPhone apps Read More


WHITE PAPER: Alcatel-Lucent, Arista, Avaya, Brocade, IBM, and Juniper

An Approach that Meets the Requirements of Cloud Computing
The advent of cloud computing changes the approach to data center networks in terms of throughput and resilience. The ability to scale, control, visualize and customize the cloud network is an important evolution to a "data center-in-the-box" approach. Learn more!

US intelligence agency wants technology to predict the future from public events
Publically available data that could be aggregated and used by intelligent systems to predict future events is out there, if you can harness the technology to utilize it. That's one of the driving ideas behind a program that the Intelligence Advanced Research Projects Activity (IARPA) group will detail at a Proposer's Day conference in Washington, DC next month. Read More

UK claims cybercrime victory after phishing gang sentencing
U.K. cybercrime investigators claimed victory with the sentencing of three men on Monday following the prosecution of an organized phishing gang. Read More

7 free Windows tune-up tools and tips
You don't need to spend money to keep a Windows computer running in top form. Here's how to fix, clean and maintain Windows using programs you can download now for free. Read More


WHITE PAPER: ADTRAN

Unified Communications: Getting the Green Light
In these articles, Network World and its sister IDG Enterprise publications explore the rising importance of UC within the enterprise and provide advice on how to create a working strategy. Learn more

Cloud services as part of a BC/DR plan after a terror attack
I was talking to a friend about data security over lunch today and we discussed 'dirty bombs' and a what-if scenario for small-and-medium sized businesses. Read More

Who are all these hacker groups?
Hacker groups that attack or steal—some estimates say there are as many as 6,000 of such groups online with about 50,000 "bad actors" around the world drifting in and out of them—are a threat, but the goals, methods, effectiveness of these groups varies widely. Read More

Microsoft yanks security site search after scammers poison results with porn
Microsoft on Saturday disabled the search tool on its Safety & Security Center after attackers poisoned results with links to pornographic URLs. Read More

Online Social Security Statement in limbo as agency adjusts for future
While the debate over Social Security benefits is heating up in Congress one of the most basic ways everyone interacts with the agency - the yearly Social Security Statement - is in limbo as the agency struggles to move it online. Read More

Apathy, law enforcement complications keep cybercrime hopping
General public apathy and collaboration with the law enforcement community assure that cybercrimes of all sorts will continue to rise. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

Five potential Facebook killers
The social networking scene is constantly in flux. Facebook is at the top of the heap right now, but challengers are springing up all the time, hoping to leverage the next big wave into a lucrative IPO. Here are five social media sites that are creating a buzz.

MOST-READ STORIES

  1. 7 free Windows tune-up tools and tips
  2. Who are all these hacker groups?
  3. Is the operating system dead?
  4. iPhone 5 rumor roll-up for the week ending July 8
  5. Google+ Privacy: 5 settings you need to know
  6. Microsoft's aversion to iOS, Android gives QuickOffice a chance
  7. The best of 'Damn you, autocorrect'
  8. Ballmer, Branson headline Microsoft's partner conference
  9. A conversation with Jayshree Ullal CEO, Arista Networks
  10. Caution: WiFi design challenges ahead

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment