Friday, June 04, 2010

Cyberattacks seen as top threat to zap U.S. power grid; Managing enterprise smartphone risk

Endpoint security: managing enterprise smartphone risk | Data Protection: SIEM use up in midsized orgs, surveys say

Network World Compliance

Forward this to a Friend >>>


Cyberattacks seen as top threat to zap U.S. power grid
Cyber attacks, pandemics and electromagnetic disturbances are the three top "high impact" risks to the U.S. and Canadian power-generation grids, according to a report from the North American Electric Reliability Corp. (NERC) Read More


WHITE PAPER: IBM

Read SecurityCurve's Analyst WP
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application software development lifecycle. Click to continue

RESOURCE COMPLIMENTS OF: Sophos

FREE Encryption Tool from Sophos
Encrypt and share your confidential files easily without having a full blown encryption solution in place. Click to continue

Endpoint security: managing enterprise smartphone risk
Almost by the day, enterprises are becoming more receptive to the consumerisation of IT and introduction of mobile devices and platforms into their environment. Read More

Data Protection: SIEM use up in midsized orgs, surveys say
Two surveys conducted by the SANS Institute and RSA suggest medium-sized companies are taking the use of SIEM technology to a level more commonly seen in larger enterprises. Here's why. Read More

FTC cracks down on spyware seller
The U.S. Federal Trade Commission has reached a settlement with Florida spyware vendor CyberSpy Software, two years after suing the company for selling "100 percent undetectable" keylogging software. Read More

Facebook CEO Sweats Site's Privacy Issues at D8
Facebook CEO Mark Zuckerberg responded to criticisms surrounding user privacy and admitted his company had made mistakes during an interview at the D8 conference on Wednesday. The Facebook chief also took questions from the audience denying the rumor that the social network was building a Webmail service to compete with Gmail and Hotmail, according to All Things D. Read More


WHITE PAPER: Novell

Intelligent Storage Management at the File Level
Many storage management tools for file storage are "dumb." They treat all files the same regardless of business relevance and they lack the ability to automate user-storage management tasks or set policies based on business requirements. Learn how to augment your existing storage management system with intelligence at the file level. Read Now

Panda Security Expands Free Cloud Antivirus Protection
Panda Security blazed new trails in PC security when it launched its free cloud-based antivirus protection last year. Now, Panda Security is expanding the protection provided in the free version, and adding a Pro Edition with additional features and capabilities. Panda Cloud Antivirus delivers malware protection that small and medium businesses need, and the price is right. Read More

10 most controversial technology stories of 2010 – so far
digg_url = 'http://digg.com/tech_news/10_most_controversial_technology_stories_of_2010_so_far'; Everyone loves a controversial story and the technology industry has been serving them up left and right in 2010, typically featuring big names like Apple, Google and Comcast. Here's a look back at the biggest such headlines so far this year: Read More

2010 tech industry graveyard
Here we pay respects to a slew of companies, technologies (including from Google and Microsoft) and ideas that mainly held lots of promise but met or will soon meet their demise for any number of reasons: being ahead of their time; getting whacked by the economy; being surpassed by something new. A few of the bodies are still warm, and there's even the occasional life-after-death experience.Related stories:2009 IT industry graveyard 2008 IT industry graveyard 2007 IT industry graveyard Read More

Photo forensics: Identifying faked pictures
Recently a family member sent me a set of pictures supposedly showing Mexican headstones with insulting epitaphs: Read More


E-GUIDE: Compuware

Perfecting Application Performance
The enterprise application scene has become increasingly complicated over the years. Things have changed with the rise of Web services, SOA, Virtualization and cloud computing. In this Executive Guide explore how to get the best performance out of today's application environments. Read Now.

Microsoft counters report of Google's dumping Windows
On the heels of a report that Google will phase out Windows in its workplace over security concerns, Microsoft on Tuesday stood up for its operating system. Read More

Facebook likejacking attacks continue with 'Paramore n-a-k-ed photo leaked!'
Facebook users are falling for yet another clickjacking scam that fools them into "liking" a page. Read More

FTC pushes back identity theft rules deadline -- for fifth time
The Federal Trade Commission (FTC) has once again pushed back its enforcement deadline for an identity theft --lated regulation called the Red Flags Rule. Read More

What You Don't Know about Your Online Reputation Can Hurt You
Social networking, and the broader concept of online privacy, have been under some rather intense scrutiny over the past couple of weeks. The issues at Google--voracious indexer of all things Internet, and Facebook--the largest social network and number one most visited site (according to Google) have made many users more acutely aware of what information is available about them on the Internet. However, your online reputation is being used in ways you may not be aware of, and could cost you. Read More

Google Wi-Fi Snooping Should Serve As Security Wakeup Call
The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon. Peeved government officials in both Europe and the U.S. are pressing Google for more details on how the search company's Street View cars managed to cull personal data from Wi-Fi networks that weren't password-protected. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

10 useful Firefox-based apps
Here are 10 useful desktop programs that run on the open-source Web browser's native technology. All of these applications are free for you to download and use -- and only one is a Web browser.

Steve Ballmer as emoticons
It's not often hard to guess what Steve Ballmer is feeling. The Microsoft CEO has one of the most recognized, and photographed, faces in the IT industry - and it's also one of the most expressive.

MOST-READ STORIES

  1. Android rootkit is just a phone call away
  2. Five things to pass along to new networkers
  3. 10 useful Firefox-based apps
  4. Photo forensics: Identifying faked pictures
  5. Facebook likejacking attacks continue
  6. Time to start eliminating Windows XP, Gartner says
  7. Microsoft counters report of Google's dumping Windows
  8. AT&T shifts to usage-based wireless data plans
  9. How Apple topped Microsoft
  10. Why does the open source community love Apple?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: