Friday, November 09, 2012

11 sorriest tech companies of 2012

Are lawyers getting in the way of cloud-based security? | Do you have a disaster-preparedness plan?

Network World Compliance

Forward this to a Friend >>>


11 sorriest tech companies of 2012
Vendors apologize in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach Read More


RESOURCE COMPLIMENTS OF: DameWare, part of the SolarWinds Family

Affordable Remote Support Software for Mixed-OS Environments
DameWare Remote Support Software allows you to control Mac OS X, Linux and Windows machines - without leaving your desk! Fix end-users problem quickly & remotely with DameWare. Manage your IT infrastructure - domains, workstations, disk drives, & event logs - all from one console AND in a mixed-OS environment. Easy to afford. Simple to use. It's so affordable – why not just try it? Download a fully functional, free 14-day trial today and discover why thousands of system administrators use DameWare to remotely control Mac, Linux and Windows machines every day!

In this Issue


WEBCAST: Teradata

Big Data Done Right
View this on-demand webcast to learn how to reap the benefits of big data through a practical unified architecture; how to improve performance with in-memory technology; and how to lower costs and increase scalability through cloud computing. Register now.

Are lawyers getting in the way of cloud-based security?
In an age where enterprises and their employees are being relentlessly targeted with malware-based phishing, denial-of-service and other attacks, the ability of the IT security staff to defend their networks and valuable corporate data faces yet one more obstacle, according to some: their own company lawyers. Read More

INSIDER
Do you have a disaster-preparedness plan?
What Sept. 11, 2001 taught network administrators is that having your backup server on site was not much of a backup if the entire grid went down. So in the past decade big strides have been made to create duplication offsite. With the latest natural disaster in Hurricane Sandy making a path of destruction through the East, the disaster preparedness plan is being put to a test. Read More

Heist once again highlights e-banking vulnerabilities
The CFO of a Missouri firm who discover that cyber thieves had withdrawn $180,000 from the company's account overnight called it "a helluva wake-up call." But he might have avoided the mess if he has paid better attention to the risks of electronic banking. Read More

How to Secure Big Data in Hadoop
The promise of big data is enormous, but it can also become an albatross around your neck if you don't make security of both your data and your infrastructure a key part of your big data project from the beginning. Here are some steps you can take to avoid big data pitfalls. Read More

BlackBerry 10 is FIPS certified in advance of platform's release
Research In Motion took the unusual step of announcing a tough security certification for BlackBerry 10 in advance of the device's launch next quarter. Read More


WHITE PAPER: HP

Building modern, virtualization-optimized data centers
HP offers a flexible, virtualization-optimized data center network architecture that requires far fewer devices, interconnections, layers, and discrete appliances. HP Networking solutions streamline network operations and accelerate application and service delivery; reduce space, power, cooling, and capital requirements. View Now

Huawei security chief: We can help keep U.S. safe from 'Net threats
The chief security officer of Huawei, the Chinese company recently flagged by Congress as a national security threat, says the network equipment maker could actually help the United States defend itself against malicious Internet traffic. Read More

Evolving security standards a challenge for cloud computing, expert says
Any enterprise looking to use cloud computing services will also be digging into what laws and regulations might hold in terms of security and privacy of data stored in the cloud. At the Cloud Security Alliance Congress in Orlando this week, discussion centered on two important regulatory frameworks now being put in place in Europe and the U.S. Read More

Apple seeks standard to appease angry university net managers
Under fire from its customers in the higher education market, Apple has proposed creating a new industry standard that would fix problems with its Bonjour zero configuration networking technology that is causing scalability and security problems on campus networks. Read More

How (and why) to surf the Web in secret
They say no one can hear you scream in space, but if you so much as whisper on the Web, you can be tracked by a dozen different organizations and recorded for posterity. Simply visiting a website can allow its operators to figure out your general physical location, identify details about your device information, and install advertising cookies that can track your movements around the web. (Don't believe me? Check this out.) Read More

China could be behind Twitter password reset
Twitter sent notices of an attempted hacking to China-based foreign journalists and analysts just hours before apologizing for resetting the passwords of more users than necessary in a recent break-in of accounts. Read More


WHITE PAPER: FireEye

Intensified Dangers of Email-Based Attacks
Keep your organization safe by staying educated. Download this report to learn more about identifying and preventing cyber attacks. Learn more.

Man discovers $20K-plus in hollowed-out book at my dump
Now here's a story you'll probaby never read about one of those newfangled e-readers like the Nook or Kindle: Man finds $20K-plus in a hollowed-out book at local dump. ARGUMENTS: ebooks vs. print books Read More

Cisco VP to memo leaker: Finding you is now 'my hobby'
Cisco vice president of services Mike Quinn, a former CIA operations officer, believes that whoever recently leaked an internal company memo to a blogger committed corporate treason and violated a "family" trust. In an email sent to Cisco employees, Quinn invites the anonymous leaker to voluntarily step forward, concedes that such a confession is unlikely, and adds, "so I will now make (finding) you... Read More

The US military mines social media for rich intelligence
The US military mines social media for rich intelligence Researchers and students at the Naval Postgraduate School in Monterey, California are developing tools to collect targeted data from social media. One piece of Twitter software is already in beta version, being used overseas. If it works as planned, it could change the face of modern intelligence-gathering by the military. From: networkworld Views: 24 3 ratings Time: 04:19 More in Science & Technology Read More

New Android malware disguised as security app
Android Security Suite Premium -- loaded with Zeus variant ZitMo -- is a threat to companies given the bring-your-own-device (BYOD) trend Read More

Top tools for BYOD management
SOTI MobiControl and SAP Afaria lead the way in five-vendor test of MDM tools Read More



SLIDESHOWS

15 people who said no to Facebook
Here are 15 people who have declined an opportunity with the social networking giant.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 2013 IT salaries: 15 titles getting the biggest pay raises
  2. How (and why) to surf the Web in secret
  3. Barack Obama's post-election Tweet is most popular of all time
  4. '80M bytes of storage for under $12K!' and other IT ad favorites through the years
  5. Yawns may greet Microsoft Office port to iOS and Android
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. .xxx to launch porn search engine
  8. Microsoft DRM technology will take a head count, check ID
  9. Microsoft Trustworthy Computing finally pays off in a big way
  10. Gartner's IaaS Magic Quadrant: a who's who of cloud market

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment