Friday, September 09, 2011

9/11 continues to influence IT strategy

VMware, Symantec work up cloud-based single sign-on security services | Got acne? There's NOT an iPhone, Android app for that, FTC says

Network World Security

Forward this to a Friend >>>


9/11 continues to influence IT strategy
Many companies had refined their IT disaster recovery programs prior to 9/11, but the attacks exposed a lack of attention to continuity of business operations. Read More


WHITE PAPER: Palo Alto Networks

Application Usage Report
The Palo Alto Networks' Application Usage and Risk Report summarizes application traffic assessments performed between October 2010 and May 2011 on more than 1,253 networks worldwide. Read now!

WEBCAST: VeriSign

Selecting a DDoS Mitigation Provider
Learn how Verisign manages and helps protect the internet against DDoS attacks. This webinar will also provide you with best practices for business continuity and key considerations for DDoS protection in your organization. View Now!

VMware, Symantec work up cloud-based single sign-on security services
Symantec on tap with "O3"; can VMware's "Project Horizon" be far behind? Read More

Got acne? There's NOT an iPhone, Android app for that, FTC says
The Federal Trade Commission today settled cases with two mobile companies who claimed their IPhone and Android smartphone apps could treat acne. The cases are the first the FTC says it has brought targeting mobile app health claims. Read More

Microsoft investigates its own mobile location practices
Microsoft said this week it is investigating a lawsuit's allegation that the camera application on Windows Phone 7 handsets collects location data from nearby Wi-Fi and cellular networks -- even if the user refuses permission to do so. Read More


WHITE PAPER: GFI Software

Why Customers Love VIPRE Business
Selecting an antivirus solution for your organization is an important decision. VIPRE Antivirus Business is a high-performance solution that delivers fast, memory-efficient endpoint security with all the necessary functionality you need and nothing you don't — ensuring an optimal end user performance experience. Read now!

9/11 Anniversary: What our emergency response systems still can't do
Ten years after the Sept. 11, 2001 terrorist attacks demonstrated huge gaps in the nation's emergency communications systems, there is still a long list of standard networking capabilities that are unavailable to first responders and 9-1-1 operators. Read More

9/11 Anniversary: US gets serious about fixing emergency communications
At the 10-year mark of the nation's most devastating terrorist attack -- and one of its biggest disasters of any kind -- the United States is finally getting serious about overhauling its emergency response systems, particularly its workhorse 9-1-1 call centers. Read More

OpenFlow inventor: Network provisioning will inevitably be automated
2011 has been an exciting year for Openflow and software defined networking (SDN). Continuing my informal series on Openflow, I recently got the chance to have a conversation with Nicira CTO Martin Casado to discuss the future of SDN generally and OpenFlow specifically. Read More


WHITE PAPER: Akamai Technologies, Inc.

Taming the Cloud
This whitepaper explores the components of the cloud computing ecosystem, demonstrates how Akamai is delivering services for cloud optimization, and looks forward into the evolution of this dynamic and growing market. Read now

25 tech touchstones of the past 25 years
Narrowing down the network industry's top events from the past 25 years is a little like picking your all-time baseball or football moments – something will always get left out and the second-guessers will come out of the woodwork. So what we have here is what for the moment I think are the Top 25 events that had the most influence on, or will have the most impact in the future of the industry. Read More

Cloud Confusion Fuels Security Concerns
I'm in Washington DC this week presenting at a cloud computing and virtualization conference for Federal IT professionals. Yesterday, I hosted a 3-hour tutorial on cloud computing security where I presented a recent quote attributed to former Federal CIO, Vivek Kundra. Before leaving his post, Kundra stated, "a lot of people are sort of driving this notion of fear around (cloud) security, and the... Read More

Google+ bug hides old posts
If you're a prolific Google+ user, you may be unable to see all the posts you have published on your profile due to a bug in the social networking site that hides older posts, according to the company. Read More

Symantec responds to 'panic' around DigiNotar hack
Citing "panic" resulting from a hack on Dutch SSL certificate provider DigiNotar, Symantec has confirmed that its SSL Certificate Authorities VeriSign, Thawte, GeoTrust and RapidSSL roots remain secure. Read More

Researcher raps Apple for not blocking stolen SSL certificates
A security researcher criticized Apple for what he called "foot dragging" over the DigiNotar certificate fiasco, and urged the company to quickly update Mac OS X to protect users. Read More



SLIDESHOWS

What do top CIOs make?
How high can a senior IT leader ascend in the ranks of a public company? High enough to rank among a company's most highly paid executives. High enough to enjoy perks such as company cars, financial planning services, and access to the corporate jet.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. ISP customer sales failed: Using 'it's OK they all invade privacy' argument
  2. IBM, 3M glue together high-powered silicon bricks
  3. Dot-XXX sTLD registrations begin Wednesday
  4. ATM hack gives cash on demand
  5. What online news looked like on 9/11
  6. 802.11u and Hotspot 2.0 promise Wi-Fi users a cellular-like experience
  7. Parallels Desktop 7 for Mac: An upgrade you can skip
  8. Hackers flip characters to disguise malware
  9. IT outsourcing: What HP's new strategy means for customers
  10. Suit on Cisco's China activities broadened

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment