Thursday, March 22, 2012

7 simple steps for thwarting hactivists

Cloud security registry slow to catch on | Five very cool (but kinda creepy) mobile technologies

Network World Daily News AM

Forward this to a Friend >>>


7 simple steps for thwarting hactivists
More data was stolen from corporate networks last year by hactivists than by cybercriminals, according to a new report from Verizon. Read More


RESOURCE COMPLIMENTS OF: Mitel

Virtualized voice: real benefit or illusion?
Does integrating your voice applications into your virtual data center sound like magic? Find out how companies of all sizes are realizing the cost benefits and simplified disaster recovery of unified virtualized voice and data. Learn why Mitel received VMware's prestigious Technology Innovator Partner of the Year award. It's not Magic. It's Mitel. Get in on the Voice Virtualization Act!

RESOURCE COMPLIMENTS OF: Microsoft

Try Microsoft Office 365, free
Collaborate in the cloud with Office, Exchange, SharePoint, and Lync videoconferencing. Access, edit, and share documents. Starting at $8/user/month. Try it free.

Cloud security registry slow to catch on
Last August the Cloud Security Alliance (CSA) announced at the Black Hat security conference in Las Vegas a registry that it hoped would serve as a place for prospective cloud users to go to easily inspect and compare cloud vendors' security controls. But to date, only three companies have submitted their cloud security data, making the registry of limited use. Read More

Five very cool (but kinda creepy) mobile technologies
Face recognition, voice identification, and augmented reality can enrich the mobile experience - but they can also be abused in scary ways Read More

Google's BigQuery brings big data to the cloud
While most of the talk around big data assumes such systems will be deployed in-house, Google is building a service that will allow for analyzing large amounts of data in the cloud. Read More


WHITE PAPER: Antenna

Mobile strategy—what are 1,000 businesses planning for 2012
The Mobile Business Forecast 2012 surveyed 1,000 global businesses on their current/future plans for mobile. The report offers insight into how companies are using mobile to address the needs of consumers and their own employees. In addition, find tips on how to avoid chaos in the rush to mobilize. Learn More

Most fraud against businesses from bad checks, not electronic payments
When it comes to financial fraud against businesses, it's old-fashioned paper checks that wreak more monetary damage than fraud committed through electronic payments, such as debit/credit, corporate cards, or Automated Clearinghouse (ACH) payments. Read More

Verizon defends cable spectrum deal at Senate hearing
Verizon wants to make one thing perfectly clear: Its deal to buy spectrum from several cable companies is different from the failed merger between AT&T and T-Mobile. Read More

iFixit dismantles the new iPad
The screwdriver compulsives at iFixit.com have destroyed one new iPad to tell the world what's inside it. In terms of third-party repair-ability, iFixit gives the new iPad a score of only 2 on a 10-point scale. Read More


WHITE PAPER: Oracle

Migrating Your Legacy IBM Database Environment
Download this guide to ensure a seamless migration and take advantage of reduced costs associated with extremely efficient day-to-day database administration. Learn More!

Mystery programming language in Duqu revealed
Last week, we highlighted the peculiarity of Duqu, a piece of malware security experts believe was coded by the same people who developed Stuxnet, the famed trojan which took measures to disrupt Iran's nuclear weapons program. Read More

NEC to acquire Convergys data management business for $449 million
NEC will acquire the information management business of Convergys for about US$449 million, to strengthen its telecommunications software products targeted at large carriers, it said Thursday. Read More

11 Open Source Programming Tools on the Rise
Linus Torvalds's fabled 'world domination' on the desktops of clerks or CEOs may never arrive, but it's already here on the computers of programmers everywhere. Read More



SLIDESHOWS

Review: Android-based Wi-Fi stumblers
Four easy-to-use wireless management and security tools that cost under $2.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Cisco helps users welcome BYOD
  2. Which smartphone apps are the biggest data hogs?
  3. LulzSec is back; Anonymous targets Imperva
  4. 11 promising enterprise social networks
  5. Apple denies new iPad overheating issues
  6. New iPad sales already top 3 million
  7. 'Surprise' Mac app quickly configures iOS devices
  8. Developer interest in Android slowly eroding, survey finds
  9. 9 classic computers that you can run on your Android device
  10. DARPA wants the ultimate technology, sensor network to monitor vast Arctic

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment