Tuesday, September 20, 2011

HIPAA on phones, faxes and e-mai

Former cybersecurity czar Clarke says smartphones, digital certificates create huge security problems | How to Build a Turnkey Private and Hybrid Cloud

Network World Security Strategies

Forward this to a Friend >>>


HIPAA on phones, faxes and e-mail
My wife Deborah Black (light of my life) is a neuropsychiatrist who works at two different clinics. Sometimes patients are referred from one clinic to the other, and the question arises of how to transmit the details of their medical record from one team to the other. Read More


WHITE PAPER: VMware

A Critical Step on the Journey Toward the Private Cloud
This IDC white paper includes two case studies and a sidebar highlighting the experiences of three enterprises with virtualizing their tier 1 applications, which include Oracle and Microsoft SQL databases and a Microsoft Exchange email system. Read now!

WHITE PAPER: Kaseya

How to Launch a Successful IT Automation Initiative
In this paper, we'll look at IT automation from the corporation's perspective, and discuss the steps organizations should take before launching such an initiative. We'll hear from companies that successfully implemented computer automation platforms, what their early steps were and what they would do differently if they could repeat the process. Read now

Former cybersecurity czar Clarke says smartphones, digital certificates create huge security problems
Former White House cybersecurity adviser Richard Clarke, author of the book "Cyber War," served 19 years in the Pentagon, intelligence community and State Department. At the firm he founded, Good Harbor Consulting, he advises clients on security risk management; is an on-air consultant for ABC News; and also teaches at Harvard's Kennedy School of Government. Read More

How to Build a Turnkey Private and Hybrid Cloud
CIOs and data center managers are hesitant to place important data and applications in the public cloud. As a result, turnkey, ready to go, cloud solutions have become very popular. Here are the three essential elements that should constitute any turnkey private and/or hybrid cloud solution. Read More

Security roundup: Stealing from the military; persistent threats; mammoth security problems; bot armies
Sometimes the difference between selfless valor and selfish cowardice is stark. On the same week that 21-year-old Marine Sgt. Dakota Meyer is awarded the Medal of Honor for heroism in saving his compatriots in Afghanistan, we hear that Rene Quimby, 42, is sentenced to prison for stealing 16,000 identities of U.S. military service members and using that information to steal from 650 victims. Read More


WHITE PAPER: HP & Intel

IDC: Ways to Improve the Branch Office
Well-targeted technology upgrades, coupled with a rigorous program to standardize and improve IT practices at a company's remote locations and headquarters, can deliver substantial business value and could reduce total annual IT costs in the branches by over 30%. Read now

NASA photo: The day the "Star Trek" crew met the real Enterprise
When NASA rolled out its Space Shuttle Enterprise in 1976 it was met by not only NASA dignitaries, but also some of the cast from the "Star Trek" television series. According to NASA, there was a good reason for the Star Trek folks to be there. That's because Enterprise, the first Space Shuttle, was originally to be named Constitution (in honor of the U.S. Constitution's Bicentennial that year).... Read More

ACLU on Massive Surveillance Society: Reclaim Privacy, American Liberties
The ACLU has warned that we must speak up now to reclaim our liberties that have been stripped from us in the "state of emergency" mentality decade and "surveillance society" following 9/11 in the United States. It further warns that if we do not, then the "ever-expanding" claims of national security will permanently sacrifice key freedoms like "our right to privacy and our ability to speak, dissent,... Read More

Hackers hit Japan's biggest defense contractor
Japan's largest defense contractor, Mitsubishi Heavy Industries, today acknowledged that scores of its servers and PCs had been infected with malware, but denied that any confidential information had been stolen. Read More


WHITE PAPER: Sybase

Sybase® IQ Accelerates Advanced Analytics
The market-leading column-based analytics server, Sybase® IQ offers accurate answers, scalability and speed for your advanced analytics environments. No platform is better suited to help your business analyse, compete and deliver above the competition. Read now

Google patches 32 Chrome bugs, revs browser to v.14
Google today patched 32 vulnerabilities in Chrome, paying more than $14,000 in bug bounties as it also upgraded the stable edition of the browser to version 14. Read More

US-Australia military pact deemed to cover cyberspace
For the first time, the U.S. has interpreted an existing treaty to include aggression in cyberspace as a trigger for international military cooperation. Read More

Researcher discloses zero-day flaws in SCADA systems
An Italian security researcher this week disclosed details of several zero-day vulnerabilities he discovered in SCADA products from multiple vendors, a disclosure likely to reinforce concerns about critical infrastructures. Read More



SLIDESHOWS

Cloud companies to watch: A product sampler
Our Cloud Companies to Watch story gives you the lowdown on a handful of startups looking to make their mark in a business so far dominated by the likes of Amazon, Google, Rackspace and VMware. Here's a closer look at some of the products and services being rolled out by these newcomers.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Has Google's CEO stopped using Google+?
  2. Blue Screen of Death gets new look in Windows 8
  3. 16 essential Android apps for IT pros
  4. iPhone 5 rumor roll-up for the week ending Sept. 16
  5. Enterprise WAN connectivity: MPLS VPN vs. Public Internet
  6. Inside Cisco's global security operations
  7. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
  8. 5 priorities for HP in data center switching
  9. ACLU on massive surveillance society: Reclaim privacy, American liberties
  10. Bot army being assembled, awaiting orders

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment