Friday, June 18, 2010

Banking's big dilemma: How to stop cyberheists; Gartner survey highlights ID management

Identity management top security priority in Gartner survey | Data Protection: EnergySec's plan for key infrastructure

Network World Compliance

Forward this to a Friend >>>


Banking's big dilemma: How to stop cyberheists via customer PCs
In online banking and payments, customers' PCs have become the Achilles' heel of the financial industry as cyber-crooks remotely take control of the computers to make unauthorized funds transfers, often to faraway places. Read More


WEBCAST: IBM

Webcast: Building the Business Case for Data Protection
New research reveals that C-level executives feel good data protection efforts support organizational goals such as compliance, reputation, management or customer trust, but there is a lack of confidence in the ability to safeguard sensitive information. Sponsored by IBM, this white paper reveals the value of data protection Click to continue

RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

Identity management top security priority in Gartner survey
"The No.1 priority is now identity and access management," says Gartner research director Vic Wheatman, noting the analysis is based on a close look at what IT security professionals at 308 companies are telling Gartner about their overall information spending and specific IT security projects. Read More

Data Protection: EnergySec's plan for key infrastructure
Energy companies rely on IT infrastructure more than ever. Would-be cyber terrorists know it. A group called EnergySec hopes to be ready for what may come. Read More

Controversial Windows XP vulnerability now being exploited
It only took days for hackers to take advantage of the Windows XP security vulnerability that was disclosed last week by a Google engineer Read More

iPad e-mail hackers defend attack as 'ethical'
The hackers who harvested an estimated 114,000 Apple iPad 3G owner e-mail addresses defended their actions Friday as "ethical" and said they did nothing illegal. Read More


WHITE PAPER: VMware

Quantifying the Business Value of VMware View
The paper is an analysis of organizations adopting a centralized virtual desktop (CVD) computing environment with the use of VMware View. It demonstrates that investment in the technology can result in significant business value with very high return on investment (ROI). Learn more.

iPad hacker arrested on multiple drug charges after FBI search
One of the hackers in the group that snatched more than 100,000 iPad owner e-mail addresses from AT&T's servers was arrested Tuesday on felony drug charges after the FBI searched his Arkansas home Read More

3.7 billion phishing emails were sent in the last 12 months
Cybercriminals sent 3.7 billion phishing emails over the last year, in a bid to steal money from unsuspecting web users, says CPP. Read More

Lawmakers question US cybersecurity readiness
U.S. lawmakers questioned Wednesday whether the U.S. Department of Homeland Security has the authority or resources it needs to protect the nation against cyberattacks. Read More

Not safe for work: What's acceptable office computer use
How many minutes, or hours, did you spend on Facebook today? Even if you spent just a few minutes on the popular social networking site during office hours, you're not alone. Data from Nucleus Research finds 77 percent of workers who have a Facebook account use it during work hours. Read More


WHITE PAPER: VMware

Windows 7 Migration Solutions from VMware
While the benefits of moving up to Windows 7 are compelling, the migration path introduces many challenges, including application compatibility, recoding custom apps, and carrying over user settings, data, and applications. Learn about how VMware View helps address these and other Windows 7 migration issues. Learn more.

Employee monitoring: When IT is asked to spy
It's 9:00 in the morning, or 3:00 in the afternoon, or even 10:00 at night. Do you know what your users are up to? Read More

Security, compliance come before collaboration
Enterprise 2.0 strategies are becoming more popular among companies today, but there are serious logistical and legal challenges along with the expected benefits of using social collaboration tools. Read More

Privacy concerns are nothing new
Last issue we looked at the controversy surrounding Google's collection of what appears to be personally identifiable data and storing it in databases for all and sundry to search. Some folks are up in arms about this, and I applaud them. But privacy issues like this are nothing new. Read More

Cloud security: The basics
Cloud computing is one of the most-discussed topics among IT professionals today. And not too long into any conversation about the most highly touted cloud models--software as a service (SaaS), infrastructure as a service (IaaS) or platform as a service (PaaS)--the talk often turns to cloud security. Read More

Microsoft offers security guidance for Azure cloud
The company urges developers to build apps with security in mind from the start Read More

Linux Trojan Raises Malware Concerns
I've got good news and bad news for those of the misguided perception that Linux is somehow impervious to attack or compromise. The bad news is that it turns out a vast collection of Linux systems may, in fact, be pwned. The good news, at least for IT administrators and organizations that rely on Linux as a server or desktop operating system, is that the Trojan is in a game download so it should have no bearing on Linux in a business setting. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

A brief history of smartphones
How the smartphone went from a high-end enterprise device to an everyday consumer staple.

Summer gadget guide 2010
From a solar-powered watch to a speaker for your bike helmet and a nifty geocache finder, these 10 high-tech toys are perfect for summer.

MOST-READ STORIES

  1. Dell says Ubuntu is safer than Windows
  2. Three things we'd like to see from new Motorola Droid
  3. 10 great illustrations of Linux humor
  4. DNS security reaches 'key' milestone
  5. iPad-controlled helicopter hits shelves in September
  6. Employee monitoring: When IT is asked to spy
  7. The truth about the faces in your Facebook ads
  8. Hackers exploit Windows XP zero-day, Microsoft confirms
  9. AT&T suspends iPhone 4 pre-orders until further notice
  10. Linux trojan raises malware concerns

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment