Tuesday, August 30, 2011

COBIT 5: New evolution of COBIT guidance

Browsing and Privacy: How to Not Get Tracked | New Windows worm spreads by attacking weak passwords

Network World Security Strategies

Forward this to a Friend >>>


COBIT 5: New evolution of COBIT guidance
Ken Vander Wal, CISA, CPA is International President of ISACA. COBIT is the well known framework formerly known as Control OBjectives for Information and related Technology. Mr. Vander Wal contributed the following announcement and I hope that readers will participate in improving COBIT. Read More


WHITE PAPER: ADTRAN

Adopting Unified Communications: Key Steps to Consider
The faster your business can locate, gather and share information, the more productive and competitive you can be. That's why small and medium enterprises are upgrading to a unified communications (UC) system, which can improve customer service, streamline product development and speed response to new opportunities. Learn more. >>

WHITE PAPER: CA Technologies

Three steps to agile change
Comprehensive IT change configuration and release management (CCRM) continues to confound and frustrate both IT and the business units for which it provides services. But by first instituting the appropriate foundational processes and supporting tools, many enterprises are experiencing renewed CCRM success. Read Now

Browsing and Privacy: How to Not Get Tracked
All modern browsers have built-in tools and add-ons to protect users from having their Web behavior tracked. But regardless, some sites still find ways to track you. Here are tips for taking matters into your own hands. Read More

New Windows worm spreads by attacking weak passwords
A new Windows worm is working its way through company networks by taking advantage of weak passwords, security researchers said over the weekend. Read More


WHITE PAPER: Diskeeper Corporation

The Efficiency Essentials You're Dead Without
This white paper takes you inside Diskeeper 2011 and clearly shows you why you shouldn't run your network without it. Learn more.

NASA, DARPA set aside $500,000 for private, long-distance space travel project
On paper anyway the 100 Year Starship - now with its own acronym, 100YSS -- project could be one of the most ambitious space developments ever attempted. Read More

Survey: IT pros split on allowing end users to download, install software
In their efforts to keep malware off their networks, some IT and security pros restrict end users' rights to install apps on company machines, and the majority restrict the individual applications that are allowed on the network, a survey says. Read More


WHITE PAPER: IBM

Improve IT Performance with Analytics-Based Services
To meet application performance demands, many organizations are implementing high-density computing solutions. But this places greater demands on the data center's power and cooling needs, adding to the cost of operations. Read now

5 misconceptions about file transfer security
The typical enterprise transfers thousands of files per day, making it one of the essential business productivity tools. But there are a number of file transfer security misconceptions floating around that give the technology a black eye. Here are the Top 5. Read More

In just three weeks, Facebook pays out $40K to hackers
Three weeks after launching a bug bounty program that pays Web hackers cash for finding flaws with its website, Facebook said it has paid out more than US$40,000 in rewards. Read More

Was this the e-mail that took down RSA?
"I forward this file to you for review. Please open and view it." Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

MOST-READ STORIES

  1. Distracted to death (Jennifer Aniston naked)
  2. iPhone 5 rumor rollup for the week ending Aug. 26
  3. Google to shut down Slide social apps
  4. Was this the email that took down RSA?
  5. Scariest IPv6 attack scenarios
  6. 7 ways to use HP TouchPads after they stop working
  7. What do top CIOs make?
  8. MIT researchers craft defense against wireless attacks
  9. Best networking tweaks for Windows Server, Vista and SP
  10. Silver Peak unveils free WAN acceleration product

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment