Search This Blog

Monday, July 25, 2011

Shrinking IT staff leaves security projects in the lurch

Is your IT support making you vulnerable to hackers? | The Geekiest iPad Apps Ever

Network World Security

Forward this to a Friend >>>


Shrinking IT staff leaves security projects in the lurch
Lately, I've been struggling with trying to get resources for my security projects. As my security program continues to grow and develop, I'm at the stage where I'm rolling out new security technologies, but I'm starting to run into roadblocks when it comes to getting server, network and desktop team support. It's ironic: I got the budget I need to buy security technologies, and I bought the products, but they're not installed yet because we don't have people available to do it. Read More


WEBCAST: CA Technologies

Is Your DR Plan Truly Reliable?
No matter how you define a disaster, you need a strategy that provides protection, fast recovery and high availability of your systems, applications and data. Attend this webcast to learn about disaster recovery best practices and the wide range of technologies available to protect your organization. Learn More

WHITE PAPER: Blue Coat Systems

Why You Can't Ignore WAN Optimization
WAN optimization reduces overall infrastructure costs and creates a better application experience for users. Nearly all Fortune 100 companies trust Blue Coat and enjoy: • 99% reduced bandwidth consumption • Intelligence to optimize and control video and Web applications • Accelerated cloud-delivered applications Read now!

Is your IT support making you vulnerable to hackers?
Data breaches are more prevalent and more costly than ever. Smarter technologies seem to breed smarter hackers, making it difficult for IT to keep up. But sometimes IT unwittingly helps the bad guys by improperly using core tools, such as remote support mechanisms. Read More

The Geekiest iPad Apps Ever
Show your geek-itude with these Apple iPad-errific apps Read More


WHITE PAPER: Riverbed

Case Study: Boston College
Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now

Brain implant for always-on Internet goes awry in new Web series
Twenty years into the future, after a third of the world's population decides to have a computer system called H+ implanted in their brains in order to have an always-on Internet, things go terribly wrong. A malicious virus strikes this network and billions die, leaving the computer geek who invented H+ devastated as he and other survivors attempt to overcome this botched merging of man and machine. Read More

Sexting: Pervasive cameras + Internet = Autoporn
Got kids? Think they're too sensible to send nude or seminude pictures of themselves to their buddies? Read More


WHITE PAPER: CA Technologies

Ponemon: Security of Cloud Computing Providers
This report offers the cloud providers beliefs on the state of cloud security. In addition, it compares the findings from both reports, determining similarities and discrepancies between cloud computing users and providers. Learn More

Swartz, guilty as charged?
Aaron Swartz, founder of progressive action group Demand Progress, has been a bad boy, but how bad? Read More

The business-security disconnect that won't die
When it comes to protecting sensitive data, security always seems to be a step behind the business -- despite everything you've heard. Read More

Sony insurer says it's not liable for breach-related costs
One of Sony's insurers has asked a New York court to absolve it of any responsibility for defending or indemnifying Sony against claims arising from recent data breaches at the company. Read More

Commerce Department will push privacy codes of conduct
A U.S. Department of Commerce official says the agency will convene groups to develop privacy codes of conduct. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
From IT geeks winning millions to Google mush-brain syndrome, 2011 is shaping up to be one wacky year.

MOST-READ STORIES

  1. Google: Sun offered to license Java for $100 million
  2. Rackspace's cloud going all OpenStack
  3. Toyota system automatically stops car before it hits a pedestrian
  4. 7 Solid Reasons to Keep the Faith in RIM, BlackBerry
  5. Anonymous, LulzSec vow to hack on
  6. Alcatel-Lucent confirms Enterprise business may be sold
  7. Does this video depict a future Google+ spamageddon?
  8. Still Awesome After All These Years: Eight Excellent Free Downloads
  9. 10 technologies that will change the world in the next 10 years
  10. Google Labs' greatest non-hits

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: