Search This Blog

Friday, April 30, 2010

Apple comes down hard on iPhone leakers

Terry Childs juror explains why he voted to convict | InfoSec: NHS worst culprit for data breaches

Network World Security

Forward this to a Friend >>>


Apple comes down hard on iPhone leakers
What do you do when one of your employees takes your company's top-secret prototype and leaves it behind in a beer garden, only to have it end up in the hands of a gadget blog? Call in the authorities and let them play the heavy. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Terry Childs juror explains why he voted to convict
Terry Childs' guilty conviction struck a nerve with IT staffers this week. Read More

InfoSec: NHS worst culprit for data breaches
The NHS has reported the highest number of serious data breaches of any organistion since November 2007, according to disclosures revealed by the Information Commissioner's Office. Read More

"Potentially dangerous" asteroid flashes past Earth
A 1,300 ft or about a quarter-mile long asteroid passed Earth last week at a distance of 1.5 million miles.  Read More


WHITE PAPER: Aerohive

Understand the Network Impact of 802.11n
As performance and reliability increase with 802.11n, the WLAN becomes a viable alternative to the wired network for mission- critical applications. This paper outlines the drawbacks of centralized controller-based approaches and how they will provide unavoidable roadblocks when faced with the increases in bandwidth provided by 802.11n. Read More!

What's wrong with the PCI security standard
The security standard used to protect credit cards isn't up to the task and upgrades that are planned for this fall do virtually nothing to improve it, a security expert told Interop attendees this week. Read More

PDF exploits explode, continue climb in 2010
Exploits of Adobe's PDF format jumped dramatically last year, and continue to climb during 2010, a McAfee security researcher said. Read More

Opt-in ISP-level Internet filter wasn't feasible: Academics
An opt-in/opt-out ISP-level filter, first suggested in the February 2008 Feasibility Study into ISP Level Content Filtering, was never a feasible alternative to the current ACMA blacklist, according to academics and industry experts. Read More


WHITE PAPER: Brocade

Deployment Strategies for 802.11n
Many organizations are looking to reap the benefits of the new 802.11n standard, but what is the best way to deploy wireless technology while minimizing costs? Learn why understanding the "Three Cs"-context, coverage, and capacity-is critical for choosing an optimal network implementation strategy. Read More!

Top Ten IT issues addressed at Melbourne Summit
The Autumn Members Meeting held last week in Melbourne by the Council of Australian University Directors of Information Technology (CAUDIT) has presented on the top ten issues facing university IT directors in 2010. Read More

Study: Users OK with mobile devices for transactions
Most mobile device users worldwide feel safe using their mobile devices for applications that involve highly-sensitive information, including accessing airline boarding passes; making payments in stores for low-cost items; or to access online banking, according to research conducted by Unisys Corporation. But acceptance levels vary by age, with younger users more comfortable conducting sensitive mobile transactions compared to older users. Read More

Symantec Moving to Define an Encryption Architecture
Today, Symantec announced that it is acquiring two encryption companies, GuardianEdge and PGP. Some will see this as a late counter punch to Check Point's acquisition of PointSec, McAfee's acquisition of SafeBoot, and Sophos's acquisition of Utimaco. In other words, Symantec is finally getting in the full-disk encryption game primarily on laptops. Wrong interpretation. Symantec does get endpoint... Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

Confessions of tech hoarders
How much hardware do you have hidden in your home's nooks and crannies? One tech hoarder shares pictures of his stash, as well as those of some readers.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Apple comes down hard on iPhone leakers
  2. Jon Stewart assails Apple for becoming "big brother"
  3. Texas man to plead guilty to building botnet-for-hire
  4. Admin who kept SF network passwords found guilty
  5. Is Sprint finally rebounding?
  6. Google Apps vs. Microsoft Office
  7. IPv6 tutorial
  8. FAQ: HP-Palm buy
  9. Microsoft patch causes hiccup in Cisco WAAS
  10. How to fix anything

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: