Thursday, July 28, 2011

IT security's scariest acronym: BYOD, bring your own device

HBGary Federal legal threats, not Anonymous chase Aaron Barr out of Defcon security conference | Sniffer hijacks secure traffic from unpatched iPhones

Network World Security

Forward this to a Friend >>>


IT security's scariest acronym: BYOD, bring your own device
The torrent of smartphones and tablets entering companies has created some interesting challenges for security managers. The new devices introduce new operating systems, new development environments and new security risks, but no new control. The scariest acronym in security might well be "BYOD," or "bring your own device." As companies develop security and mobility strategies to deal with these devices, it is worth bearing in mind the lessons learned from managing laptops. But it is also worth applying some of the new lessons from smartphones on the laptops, too! Read More


WHITE PAPER: Dell

Foundations of Security Information Management
This guide examines the details of each of these processes and provides best practices to build a foundation for SIM. Learn more.

WHITE PAPER: Akamai Technologies, Inc.

Taming the Cloud
This whitepaper explores the components of the cloud computing ecosystem, demonstrates how Akamai is delivering services for cloud optimization, and looks forward into the evolution of this dynamic and growing market. Read now

HBGary Federal legal threats, not Anonymous chase Aaron Barr out of Defcon security conference
Aaron Barr, the tech executive who bailed out of a talk at the Security B-Sides conference after the hacker collective Anonymous attacked the company he worked for, is bailing out of yet another conference, this time chased away by his former boss. Read More

Sniffer hijacks secure traffic from unpatched iPhones
Almost anyone can snoop the secure data traffic of unpatched iPhones and iPads using a recently-revised tool, a researcher said today as he urged owners to apply Apple's latest iOS fix. Read More

The IBM Selectric typewriter turns 50
It has been retired for 25 years but IBM will celebrate the 50th anniversary of the introduction of the iconic Selectric typewriter on July 31. Read More


WHITE PAPER: CA Technologies

Ponemon: Security of Cloud Computing Providers
This report offers the cloud providers beliefs on the state of cloud security. In addition, it compares the findings from both reports, determining similarities and discrepancies between cloud computing users and providers. Learn More

'War texting' lets hackers unlock car doors via SMS
Software that lets drivers unlock car doors and even start their vehicles using a mobile phone could let car thieves do the very same things, according to computer security researchers at iSec Partners. Read More

Cloud Security: Will Your Business Data Be Safe In the Cloud?
Is the cloud is a safe place for your critical business data to be? Cloud security consultant Ara Trembly tells you what you need to know and consider before you decide. Read More

I Was Wrong About Self-Encrypting Hard Drives
A few years ago, the EVP of marketing at EMC gave me some grief about analyst predictions. He said something like, "if I bet on your predictions and you're incorrect, I spend millions of dollars on the wrong stuff and lose my job. All you have to do is change your PowerPoint slides and move on." He was right. We analysts are always forecasting what will happen in 3-5 years but its rare that anyone... Read More


WHITE PAPER: CA Technologies

Three steps to agile change
Comprehensive IT change configuration and release management (CCRM) continues to confound and frustrate both IT and the business units for which it provides services. But by first instituting the appropriate foundational processes and supporting tools, many enterprises are experiencing renewed CCRM success. Read Now

Passwords in Mac OS X can be pilfered with new tool
A company that makes password recovery tools has released one that can snatch passwords from a locked or sleeping Macintosh running Mac OS X Lion by plugging another computer into the Mac's FireWire port. The attack technique is several years old and the only way to defend against it is to turn the Mac off. Read More

Exploit demo on tap at Black Hat could 'make your water undrinkable'
A demo at Black Hat next week will remotely hack a car alarm, unlock the doors and start the vehicle, but that's just a parlor trick to call attention to a bigger problem that has the Department of Homeland Security on alert. Read More

Debate rages over how to manage personal mobile devices used for work
Increasingly, businesses accept the idea that employees should be able to use their personal mobile devices, such as smartphones and tablets, for work. But debate is raging as to whether these employee-owned devices should be managed and secured exactly as corporate-owned devices might be. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. Wham Bam Google Ban: No Pseudonyms on Google Plus Profiles
  2. The 5 biggest IT security mistakes
  3. How to implement IPv6 in a Windows environment: an expert guide
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. 15 incredibly useful (and free) Microsoft tools for IT pros
  6. Cisco rival Juniper lands Microsoft's Muglia
  7. Law firm rallies AT&T customers to block T-Mobile merger with lure of cash
  8. 10 technologies that will change the world in the next 10 years
  9. 10 things you shouldn't be able to buy online
  10. The problem with weak passwords and hijacked Hotmail

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment