Friday, March 11, 2011

Researchers unmasking anonymous email senders

Perks drive up pay for tech CEOs | Watch out CISOs and CSOs: Chief Risk Officers may be gaining on you

Network World Compliance

Forward this to a Friend >>>


Researchers unmasking anonymous email senders
Just because you send an email anonymously doesn't mean people can't figure out who you are anymore. Read More


RESOURCE COMPLIMENTS OF: IT Roadmap Denver

IT Roadmap Denver - April 28, 2011
IT Roadmap Denver returns April 28 to the Colorado Convention Center! Through executive keynotes, ROI workshops, technical tutorials, strategy sessions, networking opportunities and a private IT expo, attendees will gain insights into the latest IT issues, trends, challenges and solutions from top IT analysts and practitioners. Register now to attend!

WHITE PAPER: IBM

How to Achieve Effective Cloud Computing
This paper focuses on private cloud computing and IDC provides a clear definition of all the elements of a private cloud and the platform infrastructure in particular. The paper details IBM private cloud offerings, their capabilities, and benefits. Read now!

Perks drive up pay for tech CEOs
Jets! Cars! Home security services! All of these perks add to tech CEOs' pay packages. Read More

Watch out CISOs and CSOs: Chief Risk Officers may be gaining on you
CSOs and CISOs may feel more pressure from a new breed of security professional - the chief information risk officer - now that the federal government has made risk management mandatory and spelled out in a new document just how risk ought to be assessed and dealt with. Read More

Corporate data breach average cost hits $7.2 million
The cost of a data breach went up to $7.2 million last year up from $6.8 million in 2009 with the average cost per compromised record in 2010 reaching $214, up 5% from 2009. Read More

8 must-have Android security apps
While Android is a terrific operating system in many ways, it does pose some real risks for IT departments. Last week's revelation that Google had to remove around 50 malware-infected applications from its Android Market highlighted the downside of the company's "free love" approach to publishing applications where it will let anyone put their app on the market and will only take it down if alerted by a third-party user. The upside of this, of course, is that the market also offers a wide variety of quality security applications that can protect you from malicious apps. Here are eight Android applications that can help IT departments keep a better hold on employees' Android-based devices. Read More


WHITE PAPER: Polycom

The Total Economic Impact of Microsoft Lync Server 2010
A Forrester Consulting study commissioned by Microsoft found that a composite organization using Lync 2010, with a risk-adjusted ROI of 337%, can achieve net benefits of over $13 million through: direct cost savings from web and teleconferencing, travel cost savings and reduced IT and telephony labor costs. Read now!

The DDoS Hall of Shame
Distributed denial of service (DDoS) attacks like the ones that nailed WordPress blogs in early March have been around for decades, but it's only in the last dozen years that they've had enough impact to grab public attention. Read More

ISACA launches audit program for social media governance
The Social Media Audit/Assurance Program focuses on effective policies, training and awareness, and monitoring, according to ISACA. Read More

Symantec's Salem: Cloud was game-changer for us
Symantec Corp. CEO Enrique Salem outlines why 03 is such a critical initiative for the company, and how cloud and virtualization changed the security threat landscape and the business opportunities for Symantec. Read More

Cyberattack-alert system could be model for U.S.
An ambitious project to create a statewide cyber-alert "early warning" system in the state of Washington to link with the federal Dept. of Homeland Security (DHS) is starting to take shape and could be a cybersecurity monitoring model for other states. Read More


WHITE PAPER: CA

Catholic Health East Success Story
Using CA Oblicore Guarantee™, CHE has been able to automate the process of SLA reporting, build a service catalog and capture reliable IT service delivery information. The solution pulls information from originating systems to populate reports, dashboards and SLA scorecards based on defined metrics. Learn More

How Google and Android users can make secure mobile market
Android has a lot going for it, but as the last week has shown its approach to selling and distributing applications is going to need some improvement. Ever since launching Android in 2007, Google has gone out of its way to making the mobile operating system the most accessible and app-friendly in the industry. Read More

New security tools protect virtual machines
As enterprises move towards virtualizing more of their servers and data center infrastructure, the security technologies that are plentiful and commonplace in the physical world become few and far between. Read More

9 Security Tips for Protecting Mobile Workers
The new working professional is always connected, and increasingly, the office is Starbucks, an airport, or home. With new flexibility comes new IT security risks for businesses. Basic defenses like antivirus are important, but not enough to keep corporate data from the increasingly sophisticated hacker. Read More

Google still scrambling to recover from DroidDream Android attack
Last week's revelation that over 50 apps in the Google Android market were malware-laden has shaken up Google and the security industry to its core. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Perks drive up pay for tech CEOs
Many tech vendors have shied away from extravagant perks, but there are still plenty worth highlighting. Like a $1.5 million tab for home security. Or how about the $36,619 one company paid to reimburse its CEO for the taxes he had to pay on the $106,589 he gained by using company aircraft for personal flights? Read on to find out which tech CEOs enjoyed the priciest perks in 2010 and which ones went to work perk-free.

First look at Google Chrome 10
Google has released the stable version of Chrome 10 and users are now being automatically updated. As always, Chrome's new features focus on security, speed and simplicity, with greater JavaScript performance, sandboxing technology for Adobe Flash, password encryption and an easier-to-use settings interface. Here's a look at the new features.

MOST-READ STORIES

  1. Researchers develop more powerful biofuel alternative
  2. Google still scrambling to recover from DroidDream Android attack
  3. Ex-Microsoft CTO publishes groundbreaking cookbook
  4. If you had bought 100 shares of Microsoft 25 years ago ...
  5. Harvard computer scientist Leslie Valiant wins Turing Award
  6. The eight most important commands on Cisco ASA security appliance
  7. VMware unleashes virtual desktops for Apple iPad
  8. Microsoft pushes more Kinect-like user interfaces
  9. Botnets, cloud computing power may be fueling attacks against VoIP
  10. Most Android, iPhone apps violate open source rules

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment