Tuesday, April 28, 2009

7 burning security questions; Military enlists open source community; 12 freebie SharePoint add-ons

Network World logo

Daily News AM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Oracle
rule

Oracle Identity Management: Buyer's Guide for Compliance Solutions
Numerous laws and regulatory mandates focus on corporate governance and accountability around sensitive information, especially financial, non-public information and protected healthcare information. Read this white paper for a compliance primer and checklist, plus details on recent mandates. The paper reviews three of the most important regulatory compliance mandates: Sarbanes-Oxley Act (SOX), Gramm-Leach-Bliley Act (GLB) and Health Insurance Portability & Accountability (HIPAA).

rule

Spotlight Story

7 burning security questions
By Ellen Messmer
There's no shortage of burning questions about IT security these days, some sparked by nasty threats, others by economic concerns and some by growing use of social networking and cloud computing. We spoke to about two dozen experts - IT customers, analysts and vendors - to nail down some answers:
Can you no longer avoid closely monitoring employees?
Should you choose a strategic security vendor or shoot for best-in-breed?
Can security processes finally be automated?
How scared should you be about security statistics?
Are security issues delaying adoption of cloud computing?
Is mobile computing the Achilles' heel in your organization?
How can you handle risks that come with social networking?

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

Military enlists open source community
The Defense Department is trying to take advantage of Web-based communities to speed up software development and reduce its costs.

12 killer freebie SharePoint add-ons
Barrett: SharePoint's popularity as a collaboration tool has exploded. So the time was right to look at add-on products for expanding its usability, management and customization. I was surprised, but happy, to find that many add-on tools for SharePoint are free.

Is the Internet Ready for a Pandemic?
As the dreaded word "pandemic" tops this week's headlines about the swine flu virus spreading around the globe, many businesses are dusting off emergency plans for employees to work from home and schools are poised to send students home. If this turns out to be a full-fledged pandemic, not only will people fall ill, the Internet will too.

Obama names Microsoft's Mundie, Google's Schmidt to technology council
The president released the names of about two dozen people who will comprise his Technology Advisory Council. Among them are Craig Mundie, Chief Research and Strategy Officer at Microsoft and Eric Schmidt, chairman and CEO of Google (and a member of Apple's board).

Group proposes cloud management standard
DMTF creates new group dubbed the Open Cloud Standards Incubator, which will be dedicated to addressing the need for open management standards for cloud computing.

Software vendor Cassatt in rough shape, bankruptcy possible, report says
Software maker Cassatt, founded in 2003 to manage virtual resources in the data center, is on the verge of a bankruptcy or sale, according to a report on Forbes.com.

BizTalk Server 2009 ready for the public
Microsoft Monday said the 2009 version of BizTalk server is now available to its MSDN and TechNet subscribers and will be publicly available on Friday.

eBay, Xerox fraudster welcomed to federal prison
This guy was a one man Internet fraud machine. Not only did he sell cars on eBAy and AutoTrader.com that he didn’t actually own but then tried to defraud folks via a Xerox copier scam. But today the system caught up with him as a judge sentenced Derrick Swantz to a little over four years in a federal prison plus an addition three years of supervised parole on charges of mail and wire fraud.

Microsoft plans to cut another $1 billion in costs
Microsoft Subnet reports that Microsft has advised Wall Street that its 2009 operating expenses are expected to come in at $26.7 billion to $26.9 billion, which is as much as $1 billion less than previous guidance, notes a story in Barrons.

Is Joost up for bid?
Cisco Subnet blogger Brad Reese says the video service, spearheaded by former Cisco star Mike Volpi, may actually be on the market.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Oracle
rule

Oracle Identity Management: Buyer's Guide for Compliance Solutions
Numerous laws and regulatory mandates focus on corporate governance and accountability around sensitive information, especially financial, non-public information and protected healthcare information. Read this white paper for a compliance primer and checklist, plus details on recent mandates. The paper reviews three of the most important regulatory compliance mandates: Sarbanes-Oxley Act (SOX), Gramm-Leach-Bliley Act (GLB) and Health Insurance Portability & Accountability (HIPAA).

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/28/09

Today's most-read stories:

  1. Some IT skills see pay hikes during downturn
  2. Seven burning security questions
  3. The downfall of Sun
  4. The legal risks of ethical hacking
  5. Conficker.E to self-destruct on May 5th?
  6. Researchers show how to take control of Windows 7
  7. Einstein systems to inspect U.S. government's Internet traffic
  8. The evolution of Ethernet
  9. The biggest losers in the Oracle, Sun deal
  10. Intel CPU cache poisoning: dangerously easy on Linux
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment