Friday, April 09, 2010

Data loss a mystery for many businesses; How risky are iPhones?

Are iPhones riskier than Android, Blackberry & Nokia phones? | Targeted cyberattacks test enterprise security controls

Network World Compliance

Forward this to a Friend >>>


Data loss a mystery for many businesses
Despite the increasing awareness of penalties and the damage that losing personal data can do to corporate reputations, network security executives are getting less certain that they can figure out if personal data has been compromised when corporate laptops are lost or stolen. Read More


: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

In this Issue


WHITE PAPER: Aruba Networks

Network Rightsizing Best Practices Guide
Network Rightsizing is an evolutionary approach to network design that significantly reduces costs while simultaneously increasing mobility for campus and enterprise users. This guide provides a methodology to enable IT to break away from the status quo of port-based network architectures, allowing an unprecedented reduction in cost and complexity. Read More!

Are iPhones riskier than Android, Blackberry & Nokia phones?
iPhones appear to pose greater security risks than Android, Blackberry and Nokia smart phones, but is this really the case? An nCircle survey says yes, security expert Charlie Miller says not necessarily, and Pwn2Own sponsor TippingPoint won't say. Read More

Targeted cyberattacks test enterprise security controls
Targeted cyberattacks of the sort that hit Google and more than 30 other tech firms earlier this year are testing enterprise security models in new ways and pose a more immediate threat to sensitive data than a full-fledged cyberwar. Read More

South Park skewers high tech
Facebook is just the latest high-tech South Park skewering: iPhone, Bill Gates, Star Trek, the Internet all get lampooned Read More

In cyberwar, who's in charge?
When the first salvos of cyberwar are fired against the United States, the responsibility to defend the country falls to the president who, aided by advisers from the broad spectrum of government agencies and also the private sector, must feel his way along an uncertain path to decide the appropriate response. Read More

Antenna Software buying specialist in mobile apps for finance, SharePoint users
Antenna Software, which offers products and services for building, rolling out and managing mobile applications, Thursday is announcing it has acquired a Boston-based company with expertise in financial and Microsoft SharePoint applications. Read More


E-GUIDE: APC by Schneider Electric

5 Ways to Shrink a Data Center
Most data centers can support an average density of 100 to 200 watts per sq. foot. The future of high-density computing – beyond 30 KW - will have to rely on water-based cooling, but is that cost effective? This expert guide discusses the latest energy technologies for today and the future. Read Now.

'Cyber War' author: U.S. needs radical changes to protect against attacks
Ex-Presidential advisor Richard Clarke writes: "U.S. military is no more capable of operating without the Internet than Amazon.com would be." Read More

Is the U.S. the nation most vulnerable to cyberattack?
everal nations, most prominently Russia, the People's Republic of China and North Korea, are already assembling cyber armies and attack weapons that could be used to attack other nations. Given that the United States is heavily dependent on technology for everything from computer-based banking to supply-chain tracking and air-traffic control, it's particularly vulnerable to the denial-of-service attacks, electronic jamming, data destruction and software-based disinformation tricks likely in a cyberattack. Read More

1-in-10 Windows PCs still vulnerable to Conficker worm
More than a year after doomsday reports suggested the Conficker worm would bring down the Internet, one-in-10 Windows PCs still have not been patched to plug the hole the worm wriggles through, new data shows. Read More

SaaS, Security and the Cloud: It's All About the Contract
Security practitioners have learned the hard way that contract negotiations are critical if their SaaS, cloud and security goals are to work. A report from CSO Perspectives and SaaScon 2010. Read More

Tokenization eases merchant PCI compliance
Today, it's expected that merchants accept electronic payments and that those payments are secure with no data leaks or breaches of any kind. But the reality is many merchants don't truly understand the vulnerabilities that electronic payments present. They may think they are secure when in fact they are at risk. Read More


WHITE PAPER: ManageEngine

Randy's Wife Was Right About OpManager
Randy S. Hollaway was the Senior System Administrator and was looking for a network management software. His wife, had used ManageEngine network management solution – OpManager. On his wife's recommendation, Randy evaluated OpManager live on his network and was impressed by how comprehensive yet easy it was. Read More

Apple iPad users offered 'antivirus' software
Apple iPad users are being offered a security program to scan their new device for vulnerabilities and rogue software should such things emerge as threats. Read More

Facebook takes steps to deal with gift card scams
Like many other Facebook users Jeff Crites heard of the US$1,000 Best Buy gift-card offer last month from a friend, a Web savvy director of social media at a Fortune 500 company. Read More

Botnets 'the Swiss Army knife of attack tools'
Hacker militias may be at the bottom of the cyberwar food chain, but when they want to hit a target, they can mobilize botnets that are already up and running, security experts say. Read More

Ruling suggests limits on employer's access to personal e-mail
Can employers read an employee's personal e-mail composed and sent via a corporate computer, and does the employer own that e-mail? Especially if it's an e-mail to a lawyer, which raises special questions of client-attorney privilege that invoke confidentiality? Read More

New cyber security threats noted in Blue Note annual report
A new report on consumer online behaviour and criminal activities on the Internet noted that new security threats have recently emerged, prompting the implementation of a mix of security solutions to protect unsuspecting victims. Read More

Cloud security: The good, bad and ugly
While vendors work to address enterprise concerns about cloud computing security, experts warn there's no easy fix. Meanwhile, cloud service outages and criminals operating in the cloud threaten enterprise acceptance of the utility computing model. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. Mystery solved: Why time stands still at 9:42 on iPhone
  2. The oddest places to find Linux
  3. South Park skewers high-tech icons
  4. iPad wish list: 10 things I'd like on iPad 2.0
  5. Is the U.S. the nation most vulnerable to cyberattack?
  6. BofA insider to plead guilty to hacking ATMs
  7. The iPad and accessories: What you need to know
  8. Apple stock continues to soar to new heights
  9. In cyberwar, who's in charge?
  10. Does Big Blue speak open source with a forked tongue?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: