Toyota accuses fired worker of major security breach Car maker Toyota has filed a lawsuit against a worker it claims attacked the company's US parts supply website as retribution for being fired. Read More WHITE PAPER: IBM
IBM InfoSphere: Solutions for Insurance By creating a single, 360-degree view of the customer with IBM InfoSphere Master Data Management, insurance companies can gain a deeper understanding of customer needs, develop targeted marketing campaigns, adapt to consumer trends and enhance the efficiency of operations. Learn More. WHITE PAPER: HP & Intel
Gartner Magic Quadrant for Blade Servers The market for blade servers is becoming ever more complex and diverse due to the convergence of related modular form factors, a fast-growing interest in fabric-based infrastructure and the influence of cloud computing on buying behavior. Download the Gartber Magic Quadrant to see how the vendors in blade servers stack up. Read Now! Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more Before their corporate jobs, many tech CEOs got their hands dirty, scrubbing oils stains off asphalt, cleaning bathrooms, and shoveling monkey cages. Here are their stories. Read More vCloud vs. vSphere: VMware explains security changes In unveiling its VCloud suite at its annual conference this week, VMware took pains to explain how the security model for it differs significantly from that of its existing vSphere cloud computing virtualization operating system both in terms of functionality and naming conventions. Read More Why passwords are failing us -- still! Three decades into the digital revolution, passwords are still complicated, ineffective and a drain on IT's resources. What gives? Insider (registration required) Read More Oft-cited cybercrime cost estimates hosed down There is general agreement that the worldwide cost of cybercrime is in the hundreds of billions. But just how many hundreds of billions is a matter of debate, following a ProPublica report that questioned the most widely quoted estimates by two major security vendors. Read More WHITE PAPER: Dell
Management Madness: How to Manage Mobile Devices There are six major mobile operating systems in use now and each one offers its own set of security and management challenges. The resources in this Mobility KnowledgeVault will help you keep these devices secure on the corporate network with expert tips on management tools, endpoint security software, increasing application support and more. Learn More Leaky web sites provide trail of clues about corporate executives You can read about Zappos' CEO Tony Hsieh on the company's Web site-- about how he sold his first company, LinkExchange to Microsoft in 1999, at the age of 24, and joined Zappos as an advisor and investor, eventually rising to the company's top post. What you might not learn is that Tony is an exercise enthusiast who gets his gear from Nikeplus.com, watches his favorite shows on the Internet streaming site Hulu, keeps up with his friends on Facebook and checks the value of his Amazon.com stock (Amazon bought Zappos in 2009) at Marketwatch.com. That lesser known information about Hsieh -- a treasure trove for hackers -- is public, all the same: leaked from e-commerce and social networking sites linked to the CEO's @zappos.com e-mail address. Read More Products of the week 8.27.12 Our roundup of intriguing new products Read More Cloud security company Zscaler attracts $38 million in funding Cloud-security provider Zscaler Thursday announced it has received $38 million in venture-capital funding, naming Lightspeed Ventures as a strategic investor but not the other venture-capital partners involved in the round. Read More Java security threats: What you need to know First, the bad news. Once again, Mac users are at risk due to a flaw in Java, similar to the one that enabled the Flashback Trojan. Even worse, there isn't (yet) a patch to fix that vulnerability. But don't worry: This time around, there's good news for Mac users: Thanks to changes Apple has made, most of us are likely to be safe from this threat. Read More WHITE PAPER: McAfee
Top 4 Security Surprises That Await Private Cloud Builders This report published by Gabriel Consulting Group discusses security risks that prospective private cloud builders might be overlooking. Learn more. Security Manager's Journal: Closing off a hole in Outlook With Outlook Anywhere, users can download their mail to untrusted PCs and leave sensitive documents behind. Read More IT's 9 biggest security threats Hacking has evolved from one-person crime of opportunity to an open market of sophisticated malware backed by crime syndicates and money launders Read More 18 great IT tools for Android These Android apps, from network sniffers to SNMP MIB browsers to SSH tools, will come in handy for network and IT pros Read More How to handle a digital-certificate fraud incident Are you prepared to deal with a security incident involving digital-certificate fraud? You should be, because if it happens, it might well involve the need to replace thousands of digital certificates used for security by your organization in applications or for other purposes. Here's how to prepare for bad news and be ready to respond when criminals undermine the complex public-key infrastructure (PKI) ecosystem. Read More Phishing attack targets users with fake BlackBerry ID email Security vendors say they've spotted phishing attacks trying to fool BlackBerry users into opening email on their Windows machines that launches malware for taking over the system. Read More |