Friday, May 03, 2013

Facebook 'Trusted Contacts' lets you pester friends to recover account access

  10 awesome ways to celebrate International Star Wars Day | The 7 elements of a successful security awareness program
 
  Network World Compliance

Forward this to a Friend >>>


Facebook 'Trusted Contacts' lets you pester friends to recover account access
Facebook Thursday said it's making available globally a feature called "Trusted Contacts" that lets users select three to five friends who can help users recover account access such as if they forget their password. Read More


RESOURCE COMPLIMENTS OF: Cisco

The Cisco Unified Workspace
Trends such as mobility, virtualization, video, collaboration, knowledge management, and cloud have come to the forefront as companies struggle with how to integrate iPads, tablets, and smartphones into their business and IT models. In response, the Cisco Unified Workspace provides a solution for creating an organization-wide mobility strategy. Learn More.

WHITE PAPER: HP, Microsoft & Intel

Easing the Online Overload
Many transaction processing systems have reached their capacity limits, so the time is right to consider the potential for running tier 1 mission-critical workloads on opens standards. This white paper highlights the key components of a properly structured and highly optmized SQL Server OLTP reference architecture. Read Now!

10 awesome ways to celebrate International Star Wars Day
How to celebrate Star Wars Day: May the fourth be with you Read More

The 7 elements of a successful security awareness program
A list of action items for CSOs looking to bolster their security awareness programs. Read More

Companies explore self-detonating data as security control
The popular Snapchat photo-messaging app used mainly by Android and iOS mobile device owners to share images that then self-destruct after 10 seconds is the sort of security idea that businesses say can help them secure online transactions with business partners. Read More

20 geeky gifts for Mother's Day
Treat the moms in your life to custom chocolate photos, propeller earrings, binary pottery and other tech-inspired Mother's Day gifts Read More


WHITE PAPER: Riverbed Technology

Enabling Ubiquitous Visibility in Virtualized Environments
Enterprises are rapidly adopting virtualization for dynamic service delivery and service management agility. IT challenges already exist in virtual environments and will only be exacerbated with the higher adoption of virtualization. Learn More

A10 airs Thunder line of ADCs, along with more DDoS protection
A10 Networks this morning announced a new line of application delivery controllers -- distinct from the existing AX series -- dubbed "Thunder," saying that the new units offer more capacity in a smaller footprint. Read More

Army Corps database on dams compromised
Expert says breach aimed at collecting 'vulnerability and targeting data' for attacks, but another says simple engineering espionage more likely Read More

2013 National Inventors Hall of Fame Inductees: From DSL to Dummies
Creators of digital subscriber line technology, CDMA and the crash-test dummy among those honored Read More

EFF: Trust Twitter -- but not Apple or Verizon -- to protect your privacy
Verizon and MySpace scored a zero out of a possible six stars in a test of how far 18 technology service providers will go to protect user data from government data demands. Read More

Australia mulls data breach notification law, but details are secret
Australia's government is keeping a tight hold on proposed data breach notification legislation that could become law before a federal election in September. Read More

'Content spoofing' a major website vulnerability, study finds
A close look at vulnerabilities in about 15,000 websites found 86% had at least one serious hole that hackers could exploit, and "content spoofing" was the most prevalent vulnerability, identified in over half of the sites, according to WhiteHat Security's annual study published today. Read More

Aging networking protocols abused in DDoS attacks
Aging networking protocols still employed by nearly every Internet-connected device are being abused by hackers to conduct distributed denial-of-service (DDoS) attacks. Read More

Encryption as an enabler: the top 10 benefits
If deployed correctly, encryption does not need to be a headache. Instead, encryption can be an enabler to achieve the flexibility, compliance and data privacy that is required in today's business environments. Read More

 
 
 

SLIDESHOWS

CEO pay

Median pay for tech CEOs in 2012 was $10.7 million, according to Network World's analysis of CEO compensation in the tech industry.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPad 5 rumor rollup for the week ending May 1

2. Arista heading off Cisco/Insieme at 100G SDNs?

3. What BlackBerry CEO Heins actually said about tablets

10. Microsoft's new idea to steal Android users is a good one

9. Aging networking protocols abused in DDoS attacks

6. Carnegie Mellon develops wee QWERTY texting technology for impossibly tiny devices

5. 2013 National Inventors Hall of Fame inductees: From DSL to Dummies

4. IBM premiers world's smallest movie -- starring 10,000 atoms

7. Greatest comebacks in tech history

8. Apache server ambushed by sophisticated backdoor attacks

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment