Friday, January 04, 2013

Security lessons from 2012

  Notable deaths of 2012 from the worlds of technology, science & inventions | How to Get a Grip on Data With 'Information Superiority'
 
  Network World Compliance

Forward this to a Friend >>>


Security lessons from 2012
More DDoS attacks on banks, cyberwarfare, and targeted attacks could well be in store in 2013, security experts warn. Read More


WHITE PAPER: Trusted Computing Group

Architect's Guide: Mobile Security Using TNC Technology
Mobile Security means managing access to corporate networks to maximize the value to staff, contractors, and even guests with mobile devices, while minimizing risk to the organization. Learn More.

WHITE PAPER: Exceed Group

Courier receives speedy delivery of cellular savings
Exceed Group proves that small and midsized companies can uncover huge savings when they implement wireless expense management with Mobil-Eye. Read about what steps Jet Delivery took to reach full optimization of their AT&T contract. Learn how to get your own free Mobil-Eye wireless expenses analysis. Learn More.

Notable deaths of 2012 from the worlds of technology, science & inventions
Commodore 64, Mr. Coffee, the cleanroom, electronic football and the laptop came from the minds of these pioneers Read More

How to Get a Grip on Data With 'Information Superiority'
To make more efficient use of data and improve data protection, take a holistic approach to information governance-one that focuses attention on the most sensitive data while removing impediments to sharing. Read More

7 deadly sins of cloud computing
Increasing your use of cloud computing? Great! Making these common security mistakes? Not great! Read More


WHITE PAPER: Salesforce.com

Incorporating Social Media Into Your Customer Service
In order to satisfy today's customer, a case must be made to incorporate social media into your customer service strategy. Read Now!

Gigabit WiFi: An 802.11ac product sampler
A round-up of current products that implement the 802.11ac "Gigabit Wi-Fi" draft standard Read More

Gartner: Cloud computing, mobile ushering in "major shift" for enterprise security practices
Gartner Thursday held forth on what it expects to be the top security trends for 2013, citing the rise of cloud computing, social media and employees bringing their own devices to work as among the forces likely to produce radical changes in how enterprises manage IT security. The market research firm also says the "major shift" expected in IT security in 2013 will shake up established IT security vendors as newer players in cloud and mobile challenge them. Read More

Cybercriminals are just businessmen at heart
Fortinet cybercrime report says that organizational structures of such illicit businesses are eerily close to legitimate companies Read More


WHITE PAPER: Netscout Systems Inc.

Holistic Service Management is Critical to the Growth of IT
This paper looks at new approaches to service delivery management to allow IT organizations to deliver better service quality, performance and user experience, and to be more predictive with application performance management and network performance management. Learn More.

Amazon hack highlights customer service security weakness
Retail support team 'falls like dominoes' to scammers, says savvy customer who documented the latest incident Read More

Cloud security to be most disruptive technology of 2012
The Security for Business Innovation Council, comprised of IT security professionals from 19 companies worldwide, called cloud computing the main disruptive force for 2013. In its report, "Information Security Shake-Up," the group said it was evident many organizations are preparing to move more business processes to the cloud. This year, it will even be "mission-critical apps and regulated data" consigned to the cloud. Read More

Growing confidence in cloud security
Cloud computing is blowing into 2013 on the winds of confidence, with IT professionals increasingly convinced that the security controls are adequate, but still very, very leery. Read More

How to talk security so people will listen (and comply!)
Sure you want users to comply with security edicts, but would you phish your own employees or share your company's hack history? At least some CIOs say yes. Insider (registration required) Read More

 
 
 

SLIDESHOWS

33 Best & Worst Celebrity Tech Moments of 2012
Playing Steve Jobs, Gaga over social networking and more tech endorsements than you can shake an iPhone at.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Why Amazon's apologies all sound the same
  2. Technologies to watch 2013: Windows Server 2012 cannot be ignored
  3. Microsoft issues quick fix for critical zero-day hole in IE
  4. Technologies to watch 2013: Cisco products, more maturity for SDNs
  5. Canonical raises curtain on Ubuntu for smartphones
  6. 9 common Spanning Tree mistakes
  7. Best IT resolutions for 2013
  8. 7 deadly sins of cloud computing
  9. Technologies to watch 2013: Gigabit Wi-Fi
  10. Apple's fix for Do Not Disturb 2013 woes: Wait until Jan. 7
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: