Friday, July 22, 2011

Microsoft patching: Still painful after all these years

The Geekiest iPad Apps Ever | Pentagon unveils five steps for better cybersecurity

Network World Compliance

Forward this to a Friend >>>


Microsoft patching: Still painful after all these years
The spring of 2011 has seen some of the largest Microsoft Patch Tuesdays ever. In April, Microsoft tied its all-time record with 17 updates that fixed 64 vulnerabilities. In June, the company issued another biggie, with 16 updates that fixed 34 vulnerabilities. Read More


WHITE PAPER: EMC

The Mandate for Converged Infrastructure Management
Converged infrastructure is changing the way data centers roll out infrastructure resources and providing a clear and achievable path to cloud computing environments. Effective management of infrastructure is a key capability that can significantly impact the degree of success for data centers going the converged route. Read more

WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

The Geekiest iPad Apps Ever
Show your geek-itude with these Apple iPad-errific apps Read More

Pentagon unveils five steps for better cybersecurity
The U.S. Department of Defense goes public with its strategy for cyberspace. Read More

Google building Postini features into Apps
Google has started to move e-mail security features from its Postini service directly into its Google Apps collaboration and communication suite. Read More

Hacktivism moves from pranks to problems
Far from being "sophisticated" attacks, LulzSec and Anonymous are run of the mill, say experts. But companies need to look to their defenses. Read More


WEBCAST: CA Technologies

Is Your DR Plan Truly Reliable?
No matter how you define a disaster, you need a strategy that provides protection, fast recovery and high availability of your systems, applications and data. Attend this webcast to learn about disaster recovery best practices and the wide range of technologies available to protect your organization. Learn More

The problem with doing - and not doing - an iPhone jailbreak
Jailbreak your iPhone or stay off the Internet, say security researchers. Read More

Security concerns aside, consumer IT takes over enterprises
To mitigate the risks associated with these technologies, organizations are moving away from a "trust-only" approach and deploying three-layer security and compliance strategies that include a combination of trust, policy and technology, the study says. Read More

Google fixes flaw that scrubbed websites from search index
Google has disabled a feature that could allow people to remove websites from its search index following a problematic discovery by an astute observer. Read More

CTIA shares tips for preventing News Corp. (or anyone else) from hacking your voicemail
If you're concerned that Rupert Murdoch or anyone else might be snooping on your voicemails, never fear: the CTIA wireless association is here to help. Read More


WHITE PAPER: Fujitsu

Midmarket Blades Lead the Pack
A rock solid base for Dynamic Infrastructures. For IT organizations the blade server environment, in combination with virtualization technologies on various levels, is the IT infrastructure of choice to achieve considerable consolidation benefits and ensuring flexible usage of server resources. Read now!

House panel approves data breach notification bill
A House subcommittee approves a data breach notification bill. Read More

Microsoft posts $250K reward for Rustock botnet herders
Microsoft upped the ante on Monday in its months-long battle against the Rustock botnet by posting a $250,000 reward for information that leads to the arrest and conviction of the hackers who controlled the malware. Read More

10 wicked off-the-cuff uses for retired NASA space shuttles
Who wouldn't eat at the Space Shuttle Café or sleep at the Shuttle Inn Read More

Will Your Business Data Be Safe In the Cloud?
It's scary out there in the cloud. Data thieves, hackers, criminals, they're all out there scouring the Internet around the clock for ways to get into your corporate networks so they can steal data from poorly protected businesses. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
From IT geeks winning millions to Google mush-brain syndrome, 2011 is shaping up to be one wacky year.

MOST-READ STORIES

  1. Lion letdowns: The new Mac OS X's biggest disappointments
  2. The full impact of Cisco's job cuts
  3. 10 technologies that will change the world in the next 10 years
  4. Big tech names: Dell, Torvalds among Google+ early adopters
  5. 15 incredibly useful (and free) Microsoft tools for IT pros
  6. Google Labs to be shut down
  7. Microsoft struggles to get Hyper-V drivers in Linux kernel
  8. Beyond Angry Birds: The 20 most acclaimed iPhone/iPad games
  9. Dell takes deeper dive into networking, buys Force10
  10. How to upgrade your Mac to OS X Lion

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: