Friday, March 04, 2011

20 hot IT security issues

Network World Compliance - Newsletter - networkworld.com
Google Android's infected apps spotlight mobile danger | 20 awesome tech products at DEMO

Network World Compliance

Forward this to a Friend >>>


20 hot IT security issues
From malware on Google's Android phones to the U.S. Defense Advanced Research Projects Agency trying to understand how stories or narratives impact security and human behavior, the security world certainly is never boring. Here we take a look at 20 security stories that have shaped the industry in the past few months. Read More


WHITE PAPER: Extreme Networks

Extreme Networks debuts 40 GbE for under $1,000
The VIM3-40G4X adds four 40 GbE connections to Summit® X650 top-of-rack stackable switches for $3,995, or less than $1,000 per port. The new module is fully compatible with existing Summit X650 and Summit X480 switches, increasing scalability of both virtualized and non-virtualized data centers. Learn more!

WHITE PAPER: BMC

Plan for the unexpected with batch integration
Learn how companies like CARFAX are improving operations with BMC Software automated scheduling tools. Read more.

Google Android's infected apps spotlight mobile danger
The Google Android Market for apps is supposed to be an apps showplace, but the fact that Google this week yanked down about 50 Android apps it found out were malicious came as something of a jolt to many in the security industry. Read More

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011. Read More

Secure best practices no proof against Stuxnet
A Tofino Security report shows that well-secured computer systems would still get infected with Stuxnet. Read More

Are you dressing the part for the security career you want?
Do the clothes we wear set the stage for success or being stuck in our security careers? Read More


WHITE PAPER: Polycom

Improve Productivity Through a UC Solution
Read how MacRoberts LLP implemented the Microsoft OCS-based collaborative communications solution in order to establish and maintain comprehensive communication links between locations and remote clients. The organization saw increased productivity, reduced costs and improved customer support. Read More

Cybercriminals targeting point-of-sale devices
Point-of-sale payment processing devices for credit and debit cards are proving to be rich targets for cybercriminals due to lax security controls, particularly among small businesses, according to a report from Trustwave. Read More

First look at Apple iPad 2: what's new, unchanged and still missing
Can't tell the difference from iPad 1…except for that white color of the tablet computer? Look more closely Read More

Lock down your mobile handheld devices for ultimate security
As corporations enable more and more true enterprise applications via mobile smart phones and tablets, the need for tight security on these devices will grow. Mobile Active Defense has a non-intrusive solution that mirrors in the mobile world what you've already built for your fixed environment. Read More

Microsoft pushes anti-AutoRun update at XP, Vista users
Microsoft last week changed how it delivers an update that disables AutoRun, a Windows feature that big name worms, including Conficker and Stuxnet, have used to infect millions of PCs. Read More


WEBCAST: Trend Micro

Leverage the Cloud for Endpoint Protection
Learn how the first virtualization-aware endpoint security system can continuously protect endpoints wherever they go. View now!

PayPal CISO: DDoS one big security threat among many
Stung by a high-profile denial-of-service attack in December, PayPal's CISO says application layer attacks remain a major threat to businesses in general, which need better defenses and actual testing of the DDoS tools they have. Read More

New Palo Alto software enforces security policies on all corporate laptops
Palo Alto Networks is coming out with software that extends its next-generation firewall protection to individual laptops no matter where they are when they tap into business networks. Read More

Google yanks over 50 infected apps from Android Market
Google has pulled more than 50 malware-infected apps from its Android Market, but hasn't yet triggered automatic uninstalls of those programs from users' phones, security experts said today. Read More

Extreme takes aim at secure mobile networking
Extreme Networks is going mobile. The company today wheeled out a roadmap that will steer the company's product line toward mobile device and application access, availability and management support. Read More

Cisco: Facebook security more important as e-mail spam levels drop
Cisco discussed Facebook security, while Websense unveiled a new Facebook anti-spam tool. Read More

Smartphones, devices spark IT security "mobile melee"
While devices such as the iPhone, iPad, Blackberry and Android are in most cases welcomed into the corporate world, there's uncertainty about how to fit them into enterprise IT security practices that have been concerned so long by Microsoft Windows. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011.

Top 10 Chrome OS extensions
Though Google is pitching it as an operating system for netbooks and lightweight notebooks, Chrome OS is essentially the Chrome Web browser bolted on top of a bare minimum version of Linux. The following extensions can improve the user experience of Chrome (OS or browser) to give you some of the functionality found in a traditional operating system.

MOST-READ STORIES

  1. Google gives antiquated 404 page a makeover
  2. First look at Apple iPad 2: what's new, unchanged, still missing
  3. Jobs unveils iPad 2: sleeker, more powerful, same price
  4. Cisco caught off guard by switching hit
  5. Tablet Tumble: iPad 2 vs. Motorola Xoom
  6. iPad 2 spoiler: RIM PlayBook tablet coming April 10?
  7. Google Android's infected apps spotlight mobile danger
  8. 5 new ways to build apps for iPhone, Android and Web browsers
  9. Open source expert takes on the hardest job at Microsoft
  10. Google yanks 21 malicious apps from Android Market, phones

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment