Search This Blog

Wednesday, November 30, 2011

How do you keep your security workforce?

  Researchers use Woodpecker to single out vulnerable Android phones | The Inside Story of Why Puma Dumped Four Cloud Vendors for One
 
  Network World Daily News PM

Forward this to a Friend >>>


How do you keep your security workforce?
Recruiting and retaining important IT staff -- particularly in the burgeoning security arena -- is a challenge for every organization and one that is only going to tougher. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant on-demand remote support with LogMeIn Rescue
Without pre-installed software, quickly connect to PCs, Macs, smartphones and tablets anywhere in the world. Get in, solve the problem, and be done in a flash. Plus, Rescue's SaaS-based platform means free upgrades and zero maintenance. Try it free today.

WHITE PAPER: Oracle

Application Upgrades and Service Oriented Architecture
A study by SOA Industry Analyst Zapthink shows that maintenance and change costs of SOA-based integrations, architected properly, are dramatically lower than traditional integration approaches. Read this whitepaper to understand why and how SOA-enablement will reduce cost and risk of Application upgrades for your organization. Learn More Today!

Researchers use Woodpecker to single out vulnerable Android phones
North Carolina State University researchers say some Android smartphone makers' efforts to go above and beyond the Google mobile platform's basics open their devices to security breaches. Read More

The Inside Story of Why Puma Dumped Four Cloud Vendors for One
Puma simplified its cloud strategy and saved money by consolidating from using four cloud vendors down to just one. Here's what they did and why they did it. Read More

Cyber Monday sales break record, surpass $1.25 billion
Consumers took advantage of Cyber Monday deals, racking up $1.25 billion worth of online purchases on the first business day of the week following Thanksgiving. Read More


WHITE PAPER: Raritan

Why Managing VMs is So Complex
Because virtual servers coexist with nonvirtualized ones, it effectively doubles the tools and efforts relevant to data center administration. Discover how a unified, out-of-band approach that aggregates management tools into a single, consolidated platform, renders the virtual and physical layers transparent from an IT management perspective. Read now!

Google Translate glitch opens security hole
Developers moving to the upcoming paid version of Google Translate need to follow the documentation so their implementation of the package doesn't lead them to paying for someone else's use of the platform. Read More

Start-up Agari debuts with security to stop fake e-mail, phishing attacks
Start-up Agari debuts today with cloud-based e-mail security services aimed at allowing enterprises and e-commerce companies to identify and block fake and spoofed e-mail exploiting their legitimate business domain names to conduct scams and phishing attacks. Read More

iPad 3 rumor rollup for the week of Nov. 28
Pray that Apple doesn't release the iPad 2S instead of iPad 3. The iOSsphere is pulsing with rumors about a new technology for a high-definition display on the Next iPad; seething over an arcane listing of "new" iPads in an arcane iOS list; and pondering winning stock strategies to exploit the upside iPad 3 will surely usher in. Read More


WHITE PAPER: HP & Intel

Finding the right cloud solutions for your organization
Today's Instant-On Enterprises need to think differently about how they source and deliver services that are enabled by technology. They need to take advantage of a hybrid delivery model—one that truly optimizes the mix between traditional IT, private cloud, and public cloud. Learn more

They're never too young to learn about passwords
That the little girl had a netbook was slightly surprising, given that she couldn't have been older than seven or eight. But her conversation with her Mom about the machine - overheard at my son's basketball practice -- wasn't surprising at all, unfortunately. "Mommy, my password isn't working." (Hands netbook to Mom.) "What's your password again, sweetie?" "Password." Read More

Gumby-bot wriggles from Harvard University labs
Harvard University researchers have demonstrated a flexible new soft robot that borrows from the movements of squid, worms and other creatures to maneuver through tight spaces. The 5-inch robot is less susceptible to falls or smashing into things than hard-bodied robots, but would be more likely to suffer a puncture. Researchers are still working on how to enable such robots to move without an external... Read More

Google Music vs. Amazon Cloud Player: How They Stack Up
The newest player in the cloud-based music space -- Google Music -- is stirring the pot with a number of competitive specs. How does it stack up to Amazon's popular Cloud Player? CIO.com's Kristin Burnham takes a look. Read More

Steve Jobs' worth, iPhone 5's arrival among 2011's top online question topics
Natural disasters -- the Japan earthquake and Hurricane Irene -- have spurred the most online news searches in 2011, though big news and rumors about Apple weren't far behind. Read More

 
 
 

SLIDESHOWS

Top IT Turkeys of 2011
You know, it just doesn't feel like Thanksgiving to me unless I have mashed potatoes, pumpkin pie, and an iPad with the annual Network World Top IT Turkeys slideshow all arranged on the table for the feast. So let's sharpen our knives and get to the carving, because these turkeys are getting cold.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Facebook under privacy watch for 20 years
  2. Hackers target IPv6
  3. 25 free open source projects IT pros will love
  4. iPhone self-combusts over Australian skies
  5. Cisco, Juniper, Check Point, Palo Alto among firms in security contest
  6. iPhone 5 rumor roll-up for the week ending Nov. 25
  7. Hackers launch millions of Java exploits, says Microsoft
  8. Cisco tells HP to lose that suit
  9. RIM to offer multiplatform device management
  10. Free software activists to take on Google with new free search engine
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: