Search This Blog

Friday, January 31, 2014

MacGyver IT: 21 tools for IT heroes

iOS vs. Android: Which is more secure? | NSA gets its first civil liberties and privacy officer

Network World Compliance

Forward this to a Friend >>>


MacGyver IT: 21 tools for IT heroes
On the road, under duress, or out in the boonies -- save the day with these essential IT troubleshooting and repair tools Read More


WEBCAST: 8x8, Inc

Using Cloud Communications for a Competitive Advantage
Watch this Frost & Sullivan webcast to learn why distributed organizations are rejecting the old model of premises-based communications solutions and have turned to cloud communications. Learn more >>

In this Issue


WHITE PAPER: CommVault

CIO Guide to Virtual Server Data Protection
This whitepaper looks at the key questions CIOs should be asking to ensure a successful virtual server data protection solution. Learn More

iOS vs. Android: Which is more secure?
With millions of new iOS and Android devices pouring into the enterprise every quarter, it's important to know just how much risk these devices bring -- and if one mobile operating system has an edge over another when it comes to securing enterprise applications and data. Read More

NSA gets its first civil liberties and privacy officer
The National Security Agency has reportedly appointed Rebecca Richards, a former deputy privacy official at the Department of Homeland Security, as its first privacy officer. Read More

Five tips from a CIO on dealing with massive DDoS attacks
LiveJournal is a social-media blogging site that attracts millions of users each month from across the globe, especially the U.S. and Russia. Owned by Moscow-based SUP Media, its website is hosted in a Montana data center, and according to Tim Turner, the firm's London-based CIO, LiveJournal regularly faces massive distributed denial-of-service (DDoS) attacks. Read More

GoDaddy owns up to role in Twitter account hijacking incident
GoDaddy has acknowledged that one of its employees fell victim to a social engineering attack allowing a hacker to take over a customer's domain names and eventually extort a coveted Twitter user name from him. PayPal, which the victim claimed also played a role in the attack, denied the accusations. Read More


WHITE PAPER: HP and Intel®

START small, grow tall: Why cloud now
Executives and leaders look forward to the day when IT will be delivered as a pure service throughout the organization - available on demand much like electricity or water. Without a clear plan, organizations risk re-infecting their IT environments with complexity and sprawl. This paper will show you how to avoid these pitfalls. Learn More

Cloud availability trumps security concerns when it comes to Shadow IT
As pressure mounts to deliver value with ever-increasing speed, lines of business (LOB) are often drawn to cloud computing's ease of use, flexibility and rapid time-to-value. The resultant Shadow IT created by use of consumer grade cloud computing resources usually raises questions about enterprise security, but the real risk is the potential for downtime due to inadequate availability. Read More

Wikipedia dodges critical vulnerability that could have let attackers take over
The possibility of Wikipedia being taken over by attackers was just foiled by quick action on the part of Wikimedia Foundation, the nonprofit that operates Wikipedia, with the help of Check Point, the security firm that discovered the critical security hole in its code. Read More

Pharmaceutical IT chief melds five cloud security companies to bolt down resource access
Having migrated his company from on-site servers and applications to a cloud-based software-as-a-service, Nathan McBride, vice president of information technology at AMAG Pharmaceuticals, is now working to influence security by getting five cloud security service providers to build what he wants. Read More

Retailer data breach trend not likely to end soon
Three major retail chains have recently admitted being victims of massive data breaches that compromised sensitive data from over 100 million customers. Sadly, though, Target, Nieman-Marcus, and Michael's are just the beginning of a trend that isn't likely to fade away any time soon. Read More


WHITE PAPER: HP and Intel® Xeon® processors

HP 3PAR StoreServ 7000 - Enterprise for the Mid-range
In this report, the Taneja Group takes an objective, in-depth look at the features of the HP 3PAR StoreServ 7000 powered by Intel Xeon processors and critiques it against key requirements for the mid-market. Learn More

Coca-Cola suffers data breach after employee 'borrows' 55 laptops
Coca-Cola has admitted falling prey to bizarre slow-motion data breach in which an employee apparently stole dozens of laptops over several years containing the sensitive data of 74,000 people without anyone noticing. Read More

Apple reveals details on security, law enforcement info requests
Apple on Monday released more details about requests by various law enforcement agencies for information on Apple account holders in the U.S. The update was made possible by new, more relaxed federal rules on reporting such requests. Read More

Danger looms at the 2014 Winter Olympic Games in Sochi, but is Russia's security up to snuff?
That's how much has been spent on the 2014 Winter Olympic Games in Sochi, Russia so far, with the final tab projected to be even higher. Though various elements factor into this being the costliest Olympics ever -- to put things into perspective, China spent $40 billion on the 2008 Summer Olympics -- security is a big one. Read More

Google lays $2.7M on the line for Pwnium hacking contest
Google will again host its Pwnium hacking contest at a Canadian security conference in March, putting $2.7 million at stake to draw out researchers who can hack its browser-based operating system, Chrome OS. Read More


SLIDESHOWS

FIRST LOOK: New Cisco Nexus switches

Cisco extends its Nexus data center switching line.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Old-school Wi-Fi is slowing down networks, Cisco says

2. 10 apps you'll need to survive Super Bowl Sunday

3. Cisco's SDN defense takes a hit

4. Facebook eyes 'cold flash' to store those old baby pictures

5. Wikipedia dodges critical vulnerability that could have let attackers take over

6. 13 Job Search Apps That Will Help You Get Hired

7. Tech Salary Guide for 2014

8. With Motorola sale to Lenovo, Google is unloading a headache

9. Revenge is a dish best served electronically: 12 cautionary tales

10. Troll sues movie distributors for distributing movies via cell


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: