Friday, December 24, 2010

5 tips to make your CSO resume shine; 2010's weirdest tech stories

The weirdest, wackiest and stupidest sci/tech stories of 2010 | Protect Your Backup Data from Murphy's Law

Network World Compliance

Forward this to a Friend >>>


CSO resumes: 5 tips to make yours shine
The current challenges in today's job market didn't stop Phillip Mahan from bouncing back quickly after a setback. Mahan was laid off from his position as manager of information security and risk management at Unisource Worldwide in February. By April he was working again as the business information security officer with ING. There is a reason why he wasn't on the job hunt for very long: He is fanatical about his resume and his career. Read More


WHITE PAPER: Tripwire

Automation Makes Perfect
Organizations that automate compliance processes have better audit outcomes and realize an average increase in profits of 6.4%. Learn how built-in role-based workflows take error-prone, mundane tasks out of the compliance equation and allow for automatic remediation of non-compliant configurations. Read More!

In this Issue


WHITE PAPER: Tripwire

Have You Committed a Security Sin?
Almost every organization that has had a major security breach is guilty of at least one of the 7 deadly sins of network security. Learn what they are in this CSO eGuide that provides tips on keeping the villains out, reveals new mega threats and explains how to avoid pitfalls in log management planning. Read More!

The weirdest, wackiest and stupidest sci/tech stories of 2010
From exploding Droids to robotic pack mules and Apple weirdness it was a wacky year Read More

Protect Your Backup Data from Murphy's Law
Have you ever noticed that insurance seems to operate on the Murphy's Law principle? If you have it, you never need it, but as soon as the insurance is gone a catastrophe strikes. That is pretty much how backing up data often works. Read More

US to offer plethora of prize competitions to solve tough problems
Bill authorizes Feds to use prize competitions to solve complicated problemsGot a complicated problem? Hold a prize competition to solve it.  That's the basic idea behind the America Competes Act renewed by Congress this week. Read More

Cloud Security Alliance updates controls matrix
The Cloud Security Alliance's matrix is a controls framework that gives a detailed understanding of security concepts and principles that are aligned to the CSA's 13 domains. Read More

OpenBSD chief believes contractor tried to write backdoors
The lead developer of the OpenBSD operating system says that he believes that a government contracting firm that contributed code to his project "was probably contracted to write backdoors," which would grant secret access to encrypted communications. Read More


WHITE PAPER: Tripwire

Information Security and Multi-Compliance
It's common for information security managers to be held responsible for situations where they have little control or influence. This Prescriptive Guide outlines the steps information security managers can take to break the compliance blame cycle and build an information security program that works. It's common for information security managers to be held responsible for situations where they have little control or influence. This Prescriptive Guide outlines the steps information security managers can take to break the compliance blame cycle and bu

Crack Your Own Passwords for Better Security
Passwords are the primary key to our digital lives--providing the only barrier preventing sensitive data from being compromised in most cases. IT admins should think and act like a hacker to proactively identify weak passwords, and stay one step ahead of a data breach. Read More

10 even wackier USB devices
The holidays are the perfect time to stop being so serious and engage in a little frivolity. These crazy USB gadgets will help out Read More

VaporStream launches cloud-based secure messaging
The platform, available in a software-as-a-service offering, enables messages to be sent and read at a user's convenience. But unlike e-mail, the messages "vaporize" after being read. Read More

WikiLeaks fallout: DLP helps but doesn't solve, analysts say
Data leak prevention technologies have a limited but important role in protecting enterprise data, analysts say. But can the technology prevent another WikiLeaks-like fiasco? Read More

DDoS attacks threaten free speech, says report
Harvard study finds increasing DDoS attacks against human rights, dissident sites without the means to adequately defend themselves. Read More


WHITE PAPER: IBM

Top 5 IT Budget Killers
For businesses to be competitive today, they need to cut costs and improve their products and services. But how can businesses do more with less? This IBM® ebook introduces you to the 5 biggest IT budget killers: Storage expansion, system complexity, hardware sprawl, reliability and scalability. And reveals how you can eliminate them. Read Now

Man used neighbor's Wi-Fi to threaten Vice President Biden
A Blaine, Minnesota, man has pleaded guilty to charges that he hacked into his neighbor's Wi-Fi connection to e-mail death threats and child pornography, apparently with the intention of causing trouble for the unsuspecting neighbor. Read More

Having your security conference talk rejected
Few things are as frustrating as working hard on a proposal only to be turned down Read More

Researchers create botnet to learn how it works
An at-scale botnet emulation helps a team of researchers in Canada and France learn more about how armies of zombie computers operate Read More

Google adds site hacking notifications in search results
Google has started notifying its search engine users of sites in their list of query results that may have been compromised by hackers. Read More

Microsoft yanks Outlook 2007 update
Microsoft pulled an update for Outlook 2007 just two days after it was released, citing connection and performance problems for the unusual move. Read More

iHumbug! 8 iPhone apps that Scrooge would love
Whether they feature zombie elves or Justin Bieber, these apps are guaranteed to dampen holiday cheer Read More



FILL OUT A SURVEY, GET REWARDED
Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

DECEMBER GOODIES FROM THE SUBNETS
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Best and worst celebrity technology moments of 2010
Here's a look back at the year's most memorable – for better or worse – celebrity moments in technology.

Top 15 Holiday Deals on Notebooks, Netbooks, and Desktops
Black Friday is gone, Cyber Monday is history, and Cyber Week is over, but the deals are still around--if you know where to look. The holiday shopping season is in full swing, and retailers are offering great computer discounts to fit everyone's budget. Take a look inside to find netbooks for $300, desktops with widescreen monitors for under $600, and 15-inch laptops starting at $400. Check it out.

MOST-READ STORIES

  1. U.S. military strong-arming IT industry on IPv6
  2. The weirdest, wackiest and stupidest sci/tech stories of 2010
  3. Researchers reveal attack code for new IE zero-day
  4. Santa Claus placed on watchlist as possible terrorist
  5. Will 2011 be the year of mobile malware?
  6. Have yourself a very Linux Christmas
  7. FCC approves compromise net neutrality rules
  8. U.S. sets out to build photon-based optical networks
  9. HP targets Cisco Catalyst base
  10. 5 reasons to move to Windows 7, plus XP advice

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: