Friday, June 10, 2011

5 questions to ask about tablet security

Whirlwind tour of computing and telecom's top honors, awards and prizes | Data center group issues cloud usage guidelines

Network World Compliance

Forward this to a Friend >>>


5 questions to ask about tablet security
Some companies are adopting them and many employees are dying to use them. But are tablets too risky for the enterprise? Security experts ponder some of the larger questions about tablets and other mobile devices companies are facing Read More


WHITE PAPER: Avaya

Bringing Unified Communications to Life
Research indicates enterprises are increasingly integrating video in with the rest of the comm fabric. This creates an integrated comm infrastructure that includes the easy-to-use, consistent capabilities people need. Learn More

WHITE PAPER: Avaya

Enhancing customer experience: first, do no harm
Best practices for enhancing the customer experience, don't wait to long to handing problems, look for low-hanging fruit by assessing obvious problems, make technology updates when the time is right, cross pollinate the organization. Learn More

Whirlwind tour of computing and telecom's top honors, awards and prizes
From the Nobel to the Marconi: Internet, Ethernet, security and other IT/telecom pioneers get their recognition Read More

Data center group issues cloud usage guidelines
Users and vendors this week got a framework for implementing virtual data center and cloud computing environments from a group formed eight months ago to define such requirements. Read More

Lesson from SecurID breach: Don't trust your security vendor
What does a rash of attacks seemingly stemming from the RSA SecurID breach mean to most enterprises? That depends, experts say. Read More


WHITE PAPER: Avaya

Single Vendor Network: Myth or Reality
Gartner conducted an analysis of hundreds of clients and found that introducing a second vendor into the network infrastructure has a significant impact on operational costs Read Now

IBM building security into cloud fabric
IBM executives said this week that the company is looking to many of its existing tools, from the Tivoli management system to Cognos business intelligence software, to secure private and IBM-hosted hybrid clouds as customers migrate to these new computing setups. Read More

Warning: Urgent Microsoft update may be Firefox malware
A phony anti-virus scam is presenting itself as a near-perfect Microsoft update popup with one notable exception - it appears only on machines using Firefox browsers. Read More

Phishing still rules, because we're still gullible
Despite more than a decade of warnings, users still readily fall for phishing attacks. Read More


WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

Reports: Citigroup breached, customer credit-card info stolen
Citigroup has acknowledged that hackers broke into its network and stole credit-card information related to tens of thousands of customers in North America, according to several reports. Read More

US agency calls for new cybersecurity standards
A new report recommends that the U.S. Department of Commerce help the Internet industry develop cybersecurity codes of conduct. Read More

How to deal with 3 big corporate security concerns
Virtualization, mobility and social networking were flagged as posing most security risk to businesses, partly because there is no accepted set of best practices yet to protect them, IT Roadmap attendees were told. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

10 SaaS companies to watch
These days, companies are applying the software-as-a-service (SaaS) model to just about everything, from core business functions, including IT, to industry-specific processes. This list, compiled with the help of SaaS trend watchers and users, provides a representative look at what types of software you'll find offered in the cloud.

MOST-READ STORIES

  1. A call for smartphone apps that won't suck your battery dry
  2. IPv6 traffic surges at launch of World IPv6 Day
  3. Friend and Tweet with your switches and routers
  4. No news is good news on World IPv6 Day
  5. World IPv6 Day: Tech industry's most-watched event since Y2K
  6. The 7 worst tech merger ideas ever
  7. Steve Jobs campaigns for new spaceship style campus in Cupertino
  8. New Cisco edge routers optimized for IPv6 traffic
  9. World IPv6 results: The new IP protocol proves it's ready
  10. The top hidden features in Windows 8

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment