Friday, April 05, 2013

BlackBerry details extensive security protection in BlackBerry 10 OS

  No humor zone: 33 things you should never say to a TSA agent | Products of the week 4.1.13
 
  Network World Compliance

Forward this to a Friend >>>


BlackBerry details extensive security protection in BlackBerry 10 OS
The recent release of the BlackBerry 10 operating system sets the stage for a security evolution as well, according to Alex Manea, manager of security services at BlackBerry. Read More


WHITE PAPER: F5

Top Considerations When Choosing an ADC
Because of its strategic location in the data center network, the selection of an Application Delivery Controller requires careful consideration of both functional and financial factors. This paper explores important elements to evaluate, including network performance, availability and security. Learn More.

In this Issue


RESOURCE COMPLIMENTS OF: InterMapper

The #1 real-time network mapping and monitoring tool.
InterMapper provides an at-a-glance, real-time view of your network devices, services, applications, connections and traffic patterns. Drilling down on maps uncovers details needed to fix performance problems. It is an industrial strength monitoring, mapping and alerting tool that empowers network administrators to maintain healthy IT environments.

No humor zone: 33 things you should never say to a TSA agent
There is no humor in an airport. It's a fact. And while most travelers business or otherwise know that, there are a few out there who haven't gotten the message or perhaps the choose to ignore it. Either way the "People Say the Darndest Things" or "What Not to Say at an Airport" section has become one of the more popular destinations on the TSA Blog site. Read More

Products of the week 4.1.13
Our roundup of intriguing new products from companies such as Red Lion and Compuware Read More

Google transfers license for 3LM Android security technology to MDM vendor BoxTone
Mobile-device management software firm BoxTone says Google has transferred the license for the 3LM technology used to provide Android-based security capabilities to it under an arrangement in which BoxTone is given exclusive rights to 3LM features development. Read More

INSIDER
NBA Team Rebounds From IT Disaster
After Katrina, the New Orleans Hornets built a stronger disaster-recovery operation: a hot site with a diesel engine big enough to 'power a locomotive.' Read More


WHITE PAPER: Aerohive

BYOD and Beyond: How To Turn BYOD into Productivity
One of the most overlooked aspects of the BYOD phenomenon isn't just connecting the users to the network, but how to manage them once they're there. Getting mobile and BYO devices onto the network is now table stakes. View Now

Big Data Protects Intel's Info
Security Business Intelligence (SBI) earned Intel top honors in the CSO40 awards, which recognize security projects that have delivered outstanding business value. Read More

Inspector General finds email security risks at SEC
Report found with Web mail that 'nonpublic information could potentially be disclosed to unauthorized persons,' among other problems Read More

Harvard to review privacy polices in wake of email search scandal
Harvard University President Drew Faust has ordered up a review of the university's email privacy polices amid disclosures that a secret search of some deans' email accounts was broader than originally acknowledged. Read More

Businesses, privacy activists wrestle over California privacy bill
For privacy advocates, bill a 'foundational step,' but the Chamber of Commerce says proposed law goes too far Read More


WHITE PAPER: IBM Corporation

Powerful Application Solutions for CRM & ERP
This white paper examines how you can get the most from CRM and ERP, find the best system for your business and how IBM can help. Learn More.

Spammers dodge junk filters with Google Translate
Junksters exploit Search Giant's good name to whitewash malicious messages Read More

Spam fighter, spammer spat becomes massive DDoS attack
Spamhaus blacklisting of Dutch company results in cyberattack of historical proportions Read More

Data leakage risk rises with cloud storage services
The biggest danger: Employees using apps such as Dropbox, Box and SugarSync for tucking away business documents to take home for work Read More

Facing FTC pressure, Apple bolsters privacy, security
Apple is adding two-factor Apple ID authentication, and announced a May 1 end for developers using iPhone and iPad UDID information Read More

Microsoft's Patch Tuesday for April to address Windows 8 vulnerabilities
Windows 8 and Windows RT are subject to critical vulnerabilities that will be addressed on Microsoft's Patch Tuesday next week, both by virtue of supporting Internet Explorer 10. Read More

Report thumping Army for mobile cyber security efforts yanked off DoD website
A report from the Inspector General of the U.S Department of Defense that's critical of the way the Army has handled mobile-device security has been inexplicably yanked from the IG DoD public website but can still be found in the Google caching system. Read More

 
 
 

SLIDESHOWS

8 things you might not know about Android

Some lesser-known facts about Google's mobile OS.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Report thumping Army for mobile cyber security efforts yanked off DoD website

2. iPad 5 rumor rollup for the week ending April 3

3. For Microsoft, going private may not be such a bad idea

9. 10 cloud development tools to set you free

5. RIP Android on HP Touchpad, 2011-2013

6. Avaya willing to share customers with Cisco, Microsoft

7. 100GB of free cloud storage ... with a catch

8. 12 LinkedIn mistakes IT pros make

10. Meet the guy who made the first cell phone call 40 years ago today

4. Three biggest misconceptions about 3D printing

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment