Search This Blog

Friday, September 24, 2010

Two-Form Authentication Gives Reason to Consider Google Apps

How to hack IP voice and video in real-time | Mobile workers pose biggest security risk

Network World Compliance

Forward this to a Friend >>>


Two-Form Authentication Gives Reason to Consider Google Apps
Google announced that it is implementing two-factor authentication for Google Apps to improve security. The introduction of more stringent authentication controls removes one of the hurdles for businesses to embrace Google Apps and makes the productivity suite a more viable option for organizations concerned with security in the cloud. Read More


WHITE PAPER: Biamp

The IT Survival Guide to Audio Conferencing
IT managers who understand the unique requirements of audio conferencing systems and know how to avoid common audio pitfalls are an indispensable resource for their companies. In this guide you'll learn how to navigate the AV landscape, find trusted resources, understand the language, and avoid making critical mistakes. Read now.

WHITE PAPER: Fluke Networks

Field Testing Installed Optical Fiber Cabling
As traffic over networks expands and expectations of reliability increase, testing optical fiber cabling after installation is more important than ever before to assure the end-user that the installation was done properly and that the cabling will support Local Area Networks (LAN) into the future. Read now!

How to hack IP voice and video in real-time
Corporate video conferences can still be easily hacked by insiders using a freeware tool that allows attackers to monitor calls in real-time and record them in files suitable for posting on YouTube. Read More

Mobile workers pose biggest security risk
Mobile workers trigger more security alerts when they leave the office than when they do at their desks, the latest Symantec MessageLabs Intelligence Report has suggested. Read More

Legally defensible security on HIPAA, CMR 17
HIPAA and HITECH compliance is not necessarily the same as Mass 201 CMR 17 compliance, but there are common procedures to achieve "legally defensible" security. Read More

A Browser Cookie That Won't Go Away?
"Evercookie" is the browser cookie that just won't go away. If you're concerned about having your Web browsing history tracked, you, like most people, will probably delete your cookies and clear your browsers' caches. However, evercookie, written in JavaScript, produces "extremely persistent cookies" that can identify a client even after you've removed standard or Flash cookies. Read More


WHITE PAPER: BMC

Looking Ahead: A Cloud Report from 2015
Learn why BMC Software's chief information officer foresees a future in which organizations realize how secure the public cloud is, underutilization of hardware is a thing of the past and daily business operations are more productive. Read More

Hackers exploit latest Microsoft zero-day bug
Microsoft is warning users that hackers are exploiting the unpatched bug in ASP.Net to hijack encrypted Web sessions. Read More

How much should you spend on IT security?
It may be difficult for enterprises to figure out how much they should spend on IT security, but research analyst Gartner has statistics on how much their peers are spending. Read More

Can behavioral biometrics help detect terrorists entering the U.S.?
Fingerprinting air passengers entering the United States is one counter-terrorism method used today . But the Department of Homeland Security (DHS) has another idea in the works: a behavioral biometrics monitoring system that gauges small changes in a person's body, dubbed the "fidget factor," especially in answer to a question such as "Do you intend to cause harm to America?" Read More

Survey finds low use of Microsoft encryption technology
Microsoft's full-disk encryption feature is not being widely used, even where it is part of the Windows operating system, according to a new survey released by security vendor Opswat. Read More


WHITE PAPER: Blue Coat Systems

Managing Major Online Events
If your organization allows recreational video at all, you need to ensure that you retain control of the network to mitigate any risk. Click to learn how a combination of policy and Blue Coat technologies can support business needs and keep employees productive and happy. Free the WAN with Blue Coat. Read now!

Google Transparency Report shows U.S., Brazil make most data removal requests
Google has introduced a Transparency Report that lets you see which countries are asking the search company for data on its users and making requests for data removal. Read More

The missing piece of cloud security?
Cloud computing, especially public cloud infrastructure-as-a-service is not yet a reality for the vast majority of companies. Recent announcements however, from VMware, Citrix and Oracle clearly show that enterprise cloud computing is gaining momentum. Read More

Lily Allen sues Apple over hacked laptop
Pop singer Lily Allen is reportedly suing Apple over a hacked laptop. Read More

Gartner: Mobile commerce growth outpaces anti-fraud tools
By 2014, about 12% of all e-commerce transactions will be made using smartphones and other mobile devices, but fraud detection tools for mobile commerce are lagging, Gartner said today. Read More

AVG to help students battle Facebook status jacking
AVG has launched an online campaign to help university students combat Facebook status jacking. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

5 Strange Ways iPhones Die: Insurer Hears it All
What do toilets, beer and elevators have in common? They all send many iPhones to their death, says consumer electronics insurer Worth Ave. Group, which shared some unfortunate tales of iPhone disaster.

Ultimate guide to the flat data center network
The traditional three-tier network had a good run, but its age is starting to show in today's brave new world of server consolidation, virtual machines, cloud computing and 10Gigabit switches. Here's a look at where we've been and where we might be headed.

MOST-READ STORIES

  1. Windows 7 'halo' effect boosts customer satisfaction scores
  2. Businesses gobbling up Google Android smartphones
  3. Was Stuxnet built to attack Iran's nuclear program?
  4. Oracle's "new" kernel for RHEL clone: The real truth
  5. How much should you spend on IT security?
  6. Microsoft HPC claim: Windows is cheaper than Linux
  7. Cisco updates small-business switches, phones, cameras
  8. Can behavioral biometrics help detect terrorists entering the U.S.?
  9. How to hack IP voice and video in real-time
  10. AT&T on loss of iPhone exclusivity: What, me worry?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: