Friday, February 18, 2011

Angry employees tattling on companies that violate software licenses

Survey: When IT professionals cheat | Hot products from RSA 2011

Network World Compliance

Forward this to a Friend >>>


Angry employees tattling on companies that violate software licenses
Software piracy by IT professionals is rampant, according to a survey of 200 IT professionals on IT Ethics conducted by Network World. While 89% of respondents said it was unethical for an IT employee to make the company fall out of compliance with software license agreements, 70% said they have directly witnessed other IT folks knowingly violating software licenses. Read More


RESOURCE COMPLIMENTS OF: Citrix XenServer

Download Free XenServer
XenServer is the only enterprise-ready, cloud-proven virtualization platform you don't have to pay for. With live migration, centralized multi-server management, and shared storage support, you can't afford not to try it! Click to continue

ARTICLE: BMC

How to Choose a SaaS-based Service Desk for Your Business
With a SaaS-based service desk solution, you can eliminate the headaches of buying and maintaining servers and software — allowing you to "manage services, not servers." But how do you choose the right one? Learn the nine things to look for in a SaaS service desk that will deliver the most value for your business.

Survey: When IT professionals cheat
We asked 200 IT professionals to tell us how often IT workers cheat on certification exams, buy fake gear or illegally share software. Read More

Hot products from RSA 2011
Security conference showcases the next trends in network security. Read More

7 ways to avoid getting hacked by Anonymous
The hactivist group Anonymous used a series of simple technical and social exploits to crack the network of security-technology firm HBGary Federal, giving the company a schooling that other network security pros can learn from. Read More


WHITE PAPER: Diskeeper

System Reliability Improvements and Benefits with Diskeeper
Over 300 IT managers evaluate Diskeeper on crucial issues that can make or break a site's viability. Read More

DoD: Military must be capable within 'cyber' domain
U.S. Deputy Secretary of Defense William Lynn III said the Department Of Defense (DoD) will soon complete a new cyber security strategy that explicitly recognizes cyberspace as a new battlefield. Read More

Hacked and now vandalized, HBGary pulls out of RSA
The California security company that is at the center of a controversy over a plan to discredit WikiLeaks and its supporters abruptly pulled itself out of the RSA security conference in San Francisco this week, citing security concerns. Read More

Tablets, smartphones force Cisco to rethink how security works
SAN FRANCISCO -- Cisco has unveiled a self-described "complicated" security architecture dubbed SecureX that it says provides a context-aware way to safeguard networks increasingly overrun with smartphones, tablets and virtualization. Read More


WHITE PAPER: HP

Best Practices for Successful Video Collaboration
This paper examines the need for advanced communications in today's business environment; looks at how and where video collaboration fits into unified communications and collaboration; and discusses the value of video collaboration services in the market today. Read Now

U.S. patients trust docs, but not e-health records, survey shows
Patients in the U.S. trust their doctors, but not the electronic health records those doctors are now implementing, according to a soon-to-be-released study from CDW Healthcare. Read More

CA cloud service measures security risk, keeps out riff-raff
CA Technologies today announced its cloud-authentication service now features advanced controls to let customers more effectively control who gets into corporate applicaitions. Read More

McAfee, Intel subsidiary Wind River join forces to head off future Stuxnet-like attacks
McAfee, which will soon be an Intel subsidiary, and Wind River, which already is one, Wednesday announced they are hardening the security of industrial commercial operating systems supplied by Wind River to makers of products such as automated teller machines, medical devices, TV set-top boxes and cameras. Read More

HP combining IPS and SIEM to better fight malware
HP this week will demonstrate at the RSA Conference how its TippingPoint intrusion detection and prevention (IPS) appliance can work with the ArcSight security and event information management (SIEM) product it acquired late last year to block anomalous threat activities against Web sites. Read More

Obama seeks big boost in cybersecurity spending
The White House is proposing a big increase in cybersecurity research and development in next years budget to improve, in part, its ability to reduce the risk of insider threats and ensure the safety of control systems, such as those used at power plants. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

When IT professionals cheat
We asked 200 IT professionals to tell us how often IT workers cheat on certification exams, buy fake gear or illegally share software. Here are the results.

Tech 'firsts' that made a President's day
From the first presidential steamboat ride to the introduction of electricity in the White House to Obama's famous BlackBerry, our nation's commanders in chief have always enjoyed the privilege of being exposed to technology's cutting edge -- even if they haven't always embraced the opportunities.

MOST-READ STORIES

  1. How IT pros cheat on certification exams
  2. Microsoft IE9 not a 'modern browser,' Mozilla exec claims
  3. Banshee Amazon Store disabled in Ubuntu 11.04 by Canonical
  4. Jennings explains his Jeopardy loss to Watson
  5. Stolen HBGary e-mails indicate plans for a "new breed of rootkit"
  6. Geekiest marriage proposals of all time
  7. Full-duplex radio breakthrough can double Wi-Fi capacity
  8. iPad productivity tools: 3 must-haves
  9. Top 12 Google Labs experiments
  10. Tablets, smartphones force Cisco to rethink how security works

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: