Friday, December 23, 2011

Will Kim Jong Un be for cyberwarfare what his dad was for nukes?

Security minefield: 'Bring your own device' will bedevil IT security in 2012 | 2012: Virtual desktops are all the rage

Network World Compliance

Forward this to a Friend >>>


Will Kim Jong Un be for cyberwarfare what his dad was for nukes?
Security experts have differing views on what the death of Kim Jong Il will mean for the future of cyberattacks. Read More


WHITE PAPER: Aerohive

Eliminate Architectural Limitations of WLANs
Reduce the cost and complexity of wireless networks with cloud-enabled, distributed Wi-Fi and routing. By removing the architectural limitations of traditional WLANs, you can support identity-based access and enable delivery of mission-critical applications and services to any user, on any device, at any time without a single point of failure. Read now!

WHITE PAPER: Aruba Networks

Up to 300% more Wi-Fi to support iPads
Tablets, like the iPad, are becoming more prevalent in the enterprise. Execs, doctors, teachers, and sales people are demanding more access to corp. apps and resources over their mobile devices. According to Gartner, the limited networking capabilities of the iPad will force IT departments to increase Wi-Fi capacity by 300%. Read now.

Security minefield: 'Bring your own device' will bedevil IT security in 2012
The rapid adoption of the newest mobile devices -- especially the Apple iPhone and iPad and the Google Android-based equivalents -- will be a huge disruptive force in enterprise security next year. Not only will there be pressure to decide how to protect and manage these devices, which are growing as malware targets, the complexity of this task is magnified many times over because companies are allowing employees to use their own personal smartphones and tablets for business purposes -- what's sometime called "bring your own device" (BYOD). Read More

2012: Virtual desktops are all the rage
As budgets are locked in for 2012 it's time to aggressively expand server virtualization, and for those who have been held back by cost, to consider virtual desktops. Read More

Windows 8 may prompt malware attacks on hardware, McAfee predicts
Security features in Windows 8 will discourage operating-system attacks and drive hackers to develop malware that compromises hardware directly, according to McAfee's security predictions for 2012. Read More


WHITE PAPER: NetIQ

Streamlining IT Operations with Business Service Management
This IDC Technology Spotlight examines the benefits of a business service management practice and tools in response to IT environments becoming more dynamic and complex due to the increased use of virtualization, cloud, SOA, and n-tier application architectures. Learn More

Lady Gaga Twitter, Facebook pages recover from iPad 2 scam hacks
Lady Gaga's Twitter and Facebook pages were hacked on Monday, tricking some of her millions of followers to a scam website looking to suck up victims' personal information. Read More

Watching the watchers
While there's no single fix, a number of experts weigh-in on how to make certain those with privileged access don't abuse it. Read More

Sophos Updates Mobile Device Management Platform
Latest version of Sophos Mobile Control includes reporting dashboard for compliance enforcement Read More


WHITE PAPER: Sybase

Sybase IQ Supercharges Predictive Analytics
This white paper introduces you to Sybase® IQ—a high-performance, scalable column-store database engine which has been repeatedly proven to meet the predictive analytics needs for a wide variety of businesses. Read now.

Nation's nuclear power watchdog comes up short on FISMA compliance
Majority of compliance gaps surround configuration and vulnerability management, an independent audit finds. But NRC has made important strides, too. Read More

Chinese hack on U.S. Chamber went undetected for 6 months
Chinese hackers lurked in the U.S. Chamber of Commerce network for six months without being detected, enjoying unrestricted access although it is unknown what information they exploited, according to a published report. Read More

Top security incidents of 2011
Everyone will agree that 2011 was a busy year in the field of data security, so as the year draws to a close it seems appropriate to begin the process of distilling our experiences into "lessons learned" that we can take into 2012. Read More

Antivirus software sales expected to show strong growth in 2012
The prevalence with which hackers are handing out headaches to IT security pros will have a big upside for vendors in the coming year, according to new figures from Canalys. Read More



SLIDESHOWS

10 Things We Love and Hate about Ubuntu Oneiric Ocelot 11.10
Ubuntu 11.10 has some jagged edges and documentation isn't easy to locate, but Canonical is certainly dreaming big with this latest update, dubbed Oneiric (dreamy) Ocelot.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Dem PAC buys newtgingrich.com, wallops him with it
  2. iPad 3 rumor rollup for the week ending Dec. 20
  3. 25 useful iPad business apps
  4. Chinese hack on U.S. Chamber went undetected for six months
  5. Verizon Wireless outage outraging customers
  6. Extreme CEO: New products in 2012, growth in 2013
  7. Microsoft bails from CES tech trade show after '12
  8. IBM predicts five big technologies of the future
  9. IPv6 due for wide deployment in 2012, experts say
  10. 25 top network and IT industry news stories of 2011

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment