Wednesday, February 22, 2012

The Windows 8 Quiz

Google, Facebook bypass IE privacy settings; researchers say Microsoft knew since 2010 | (Fill in the blank)-as-a-service

Network World Security

Forward this to a Friend >>>


The Windows 8 Quiz
Microsoft's latest operating system is due out soon, how much do you know about Windows 8? Read More


WHITE PAPER: NetIQ

Streamlining IT Operations with Business Service Management
This IDC Technology Spotlight examines the benefits of a business service management practice and tools in response to IT environments becoming more dynamic and complex due to the increased use of virtualization, cloud, SOA, and n-tier application architectures. Learn More

WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

Google, Facebook bypass IE privacy settings; researchers say Microsoft knew since 2010
Microsoft announced that after it learned Google was bypassing Safari privacy settings, that it "discovered" Google is also bypassing IE privacy settings. Read More

(Fill in the blank)-as-a-service
IaaS, SaaS and PaaS are the obvious as-a-service offerings, but there are plenty of others. In fact, just about every letter of the alphabet has an "as a service." Read More


WHITE PAPER: NetIQ

5 Things You Need to Know About Disaster Recovery Planning
Download this short, easy-to-digest Disaster Recovery eBook today. It's packed with unique planning approaches to make your data center less vulnerable to natural and man-made disasters. Warning, side effects may include reduced stress levels. Learn More!

Goldman Sachs ex-programmer freed from prison
Sergey Aleynikov, a former programmer at Goldman Sachs, has been released from jail after his conviction for stealing algorithmic trading code was overturned. Read More

Apple's Gatekeeper: A low cost for partial security
Out of the blue, Apple just announced Mountain Lion, the next generation of its OS X operating system. By the time Mountain Lion ships sometime next summer, Apple says it will have lots of new features, some transported from its iOS environment of the iPhone, iPad and iPod Touch world. This column will examine just one of the new features, one that, while good, has not yet included all the functions of its iOS prototype. Read More


WHITE PAPER: Webroot

How to Protect Your Business from the Coming Malware Storm
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service. Read More Today!

5 free Android security apps: Keep your smartphone safe
There's been much controversy over mobile OS security, especially where Android is concerned. With 47% of the smartphone market in Q4 of 2011, according to ABI Research, it's no wonder that Android is getting attention. Read More

Aruba simplifies IT management of employee-owned mobile devices
New software from Aruba Networks lets IT groups secure and manage the influx of employee-owned devices to the corporate network. Read More

F5 Networks focuses on alliances with mobile-device management vendors
F5 Networks says it has entered into technology-alliance agreements with several mobile-device management (MDM) vendors in order to optimize use of F5 Technologies remote-access software with MDM software used to manage smartphones and tablets. Read More

The ultimate tips box
Got problems with insider threats? Need help securing your wireless LAN because of employees bringing their own devices on to your network? Know how to protect your Android device? Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPhone 5 release now targeted for September or October
  2. Attackers have all they need from leaky cell phone networks to track you down
  3. Privacy spat: Microsoft vs. Google vs the truth
  4. Anonymous threatens to DDoS root Internet servers
  5. You can almost create a Frankenstein-like iPad 3 monster now
  6. Google says IE privacy policy is impractical in modern Web
  7. iPhone 5 rumor rollup for the week ending Feb. 17
  8. iPad 3 rumor rollup for the week of Feb. 14
  9. ABC's Nightline goes behind the scenes at controversial Chinese iPhone factories
  10. Tech 'firsts' that made a President's day

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment