Monday, February 27, 2012

Apple's Gatekeeper: A low cost for partial security

The FBI and the DOJ want you to report suspicious people and monitor social networks. Goodbye liberty | Google-bashing by Microsoft fails laugh test

Network World Voices of Networking

Forward this to a Friend >>>


Apple's Gatekeeper: A low cost for partial security
Out of the blue, Apple just announced Mountain Lion, the next generation of its OS X operating system. By the time Mountain Lion ships sometime next summer, Apple says it will have lots of new features, some transported from its iOS environment of the iPhone, iPad and iPod Touch world. This column will examine just one of the new features, one that, while good, has not yet included all the functions of its iOS prototype. Read More


WHITE PAPER: APC

Fundamental Principles of Network Security
This paper covers the fundamentals of secure networking systems, including firewalls, network topology and secure protocols. Best practices are also given that introduce the reader to some of the more critical aspects of securing a network. Learn More!

WHITE PAPER: Tripwire

Security-In-Depth Using Integrated Risk-Conscious Controls
Today's attacks on IT infrastructure are becoming more frequent, targeted and sophisticated. They range from well-funded, state-sponsored attacks to attacks from trusted employees and consultants. Learn More!

The FBI and the DOJ want you to report suspicious people and monitor social networks. Goodbye liberty
Some of the worst consequences of terrorism come not from the real dangers that terrorism poses but in our efforts to defend ourselves from something that is incredibly hard to define and predict. Read More


WHITE PAPER: Quest Software

Exchange 2010 and Your Audit Strategy
In this Quest Software white paper, discover how to easily understand and control who accesses your company's sensitive data. Learn to implement a strong Exchange 2010 audit strategy, and read about the options that give you the power to safeguard your company's vital information. Read it today. Read Now!

Google-bashing by Microsoft fails laugh test
Vendor vs. vendor advertising spats can be enormously entertaining, although such cannot be said for this latest attempt by Microsoft to get under Google's skin. A YouTube video called Googlighting, it's a lame take-off on the '80s TV show Moonlighting, which I recall with a fondness that I cannot articulate beyond the words Cybill and Shepherd. This attempted remake, however, fails on a variety of... Read More


WEBCAST: VMware

Introduction to VMware vCenter Operations
VMware vCenter™ Operations represents a breakthrough in virtualization and cloud management. Their approach gives VI admins and operations teams powerful visualization and drill down capabilities so they can respond to building performance problems before they impact end users. View Now!

Google, Facebook bypass IE privacy settings; researchers say Microsoft knew since 2010
Microsoft announced that after it learned Google was bypassing Safari privacy settings, that it "discovered" Google is also bypassing IE privacy settings. Read More

OK Cisco, we get it
There is such a thing as over-marketing. And over-marketing can be dangerous. Anyone who cries "Wolf!" over and over again, or who repeatedly claims he or she is not something or other is likely to be eventually disbelieved and tuned out altogether. Read More

Data Center Network Security: Will Anyone Discuss This at RSA?
Less than a week before the RSA Conference in San Francisco and my telephones are ringing off the hook. People want to discuss a variety of topics including APTs, mobile security, cloud security, big data analytics, and so on. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Windows 8 logo hacked to Chinese Web site
  2. Cisco: Customers drove us to block Microsoft/Skype
  3. Carrier Ethernet 2.0 aims for global connectivity
  4. Apple's 30th birthday salute to Steve Jobs knocked off YouTube
  5. Police warn of money-stealing computer virus
  6. Five bone-headed ways stupid people will use Google Goggles
  7. iPad 3 rumor rollup for the week of Feb. 21
  8. OK Cisco, we get it
  9. A guide to tablets, great and small
  10. Hacker steals 1 million user logins from YouPorn website

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: