Monday, March 10, 2014

Focus on fundamentals to reduce data breaches, expert advises

Whittle down application sprawl | If you haven't retired Windows XP and haven't been fired yet, get busy

Network World IT Best Practices

Forward this to a Friend >>>


Focus on fundamentals to reduce data breaches, expert advises
Responsible network managers need to acknowledge that attacks leading to data breaches do happen and plan accordingly. By focusing on the fundamentals of best practices, they can control the breach and limit the amount of damage. Read More


WEBCAST: Attachmate

Unlocking and Service-Enabling Legacy Assets
Whether your strategy calls for full-blown SOA, quick-turnaround mobile applications, or anything in between, Verastream Host Integrator can help. Watch this six-minute product demo and learn the noninvasive way to encapsulate mainframe data and logic as reusable services. View Now!

WHITE PAPER: Crittercism

Getting Agnostic about Mobile Devices
The need for flawless, high-performing mobile apps is critical, yet many organizations struggle. This paper explains how to accurately analyze performance of mobile apps, calculate the cost of app failure, and how to develop, deploy and test mobile apps so that malfunctions don't happen. Read more!

Whittle down application sprawl
When it comes to shutting down out-of-date, risky or unnecessary applications, James Gordon, vice president of technology and operations at Needham Bank, doesn't mess around. Read More

If you haven't retired Windows XP and haven't been fired yet, get busy
CIOs who haven't moved their companies from Windows XP by now ought to be fired, some people think, but those who haven't and are still on the job have options for saving their bacon. Read More


WEBCAST: Attachmate

Government Agency Webifies Outdated COBOL Applications
Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year by a county department. With Verastream, they automated and standardized processes that drive the new, user-friendly front end, which accepts electronic transmissions. Learn More.

What CISOs Can Do About the Cybersecurity Skills Shortage
I had the opportunity to present some of my research on the IT security skills shortage at last week's RSA Conference. This is a serious issue that doesn't get nearly enough attention. Read More

IT Lessons Learned from Boston Marathon bombings: Dr. John Halamka
Dr. John Halamka, CIO for Beth Isreal Deaconess Hospital in Boston, chats with Computerworld's Tracy Mayor about some of the IT lessons learned following last year's Boston Marathon bombings. Read More


WHITE PAPER: Crittercism

The 2013 Mobile App Performance Management Report
Most enterprises are looking for ways to leverage their investments in web technology to handle mobile app performance, but between monitoring, OS variants, screen sizes and OEMs, this can be a costly and complex approach. This 2013 Mobile APM Report highlights best practices for meeting mobile app challenges and ensuring mobile app performance. Read more!

How to Add New Job Skills Without Going Back to School
E-learning is a cost-effective, accessible way to boost your job skills without the hassles of 'traditional' degree programs. Read More

At Goldman Sachs SDN is déjà vu all over again
Goldman Sachs has been doing SDNs for a long time. It just wasn't called SDNs when the investment giant invested in network programmability. It was just a bunch of APIs, software development kits and other code used to cobble together a large number of various specialized networks – trading, investment banking and the like -- across the globe. Read More

Five things to know about malware before driving it out
In today's network environments, malware that evades legacy defenses is pervasive, with communication and activity occurring up to once every three minutes. Unfortunately, most of this activity is inconsequential to the business. You would think that would be good news right? The problem is that incident responders have no good way of distinguishing inconsequential malware from (potentially) highly damaging malware. As a result, they spend way too much time and resources chasing red herrings while truly malicious activity slips past. Read More


SLIDESHOWS

The 700MHZ spectrum: Who owns what?

700MHZ spectrum holdings, from T-Mobile to Verizon and AT&T to Echostar.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Extensive video of the HTC M8 leaks, HTC gets real mad

2. Apple reveals unprecedented details in iOS security

3. Stanford team tries for zippier Wi-Fi in crowded buildings

4. Crazy theories and global manhunts for Bitcoin's creator Satoshi Nakamoto

5. Skype-based malware shows how 'peculiar' malicious code can be

6. Cisco revamps enterprise product pricing

7. 15 things we hate about Java

8. 9 must-do's if you must stick with Windows XP

9. If you haven't retired Windows XP and haven't been fired yet, get busy

10. Linux Foundation to offer introductory Linux MOOC on edX


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: