Monday, September 22, 2014

Software developers can test programs for weaknesses at SoftWare Assurance MarketPlace—and it's free

iOS 8 is here – and it's all over your network | Life as an IT contractor: What's it really like?

Network World IT Best Practices

Software developers can test programs for weaknesses at SoftWare Assurance MarketPlace—and it's free
Software touches every aspect of our lives today. Not only does it run our office computers and smartphones, it also controls transportation systems, utility grids, weapons guidance systems, medical devices, our personal vehicles, embedded systems of every ilk, and so much more. As vital as software has become, it's not infallible. After all, it's built by humans, and we are known to make mistakes from time to time. In today's environment of malicious actors looking for every opportunity to launch a cyber attack, it's absolutely critical that software developers use every tool at their disposal to assess their software for potential vulnerabilities. Read More

WHITE PAPER: Guidance Software

How 3 Cyber Threats Transform the Role of Incident Response
While we still use many of the same old names- trojans etc.- today's malware enables potent multistage attacks called advanced persistent threats. This paper describes how malware enables these advanced persistent threats and how enterprise information security and incident response (IR) teams can employ cyberforensics tools to minimize the damage Learn more


A New Opportunity for Capacity Planners
Mainframe software costs are the cost driver in many company's IT budgets and as such an increasing concern. We will describe the difficulty of managing an increasingly complex environment with limited data and small staffs and offer a methodology to safely and sanely identify achievable cost reductions. Learn More

iOS 8 is here – and it's all over your network
iOS 8 comes out today, creating the usual raft of IT headaches that accompanies the roll-out of new software. Linked services look like they could pose problems, for a start – Apple’s own iCloud Drive doesn’t work with pre-iOS 8 or OS X Yosemite devices, which means that items synched to the cloud using new iOS 8 devices can’t be accessed on Mac laptops and desktops, given that Yosemite hasn’t been officially released yet. Dropbox, too, has suspended all automatic media backups over compatibility issues with iOS 8. That goes for non-iOS 8 users, as well, although the company said in an official blog post that a fix is being worked on in conjunction with Apple.To read this article in full or to leave a comment, please click here Read More

Life as an IT contractor: What's it really like?
I’m writing a story about life as an IT contractor, and I’m looking for people who are game to share their experiences. If you’re interested, please check out the questions below. You can email me your answers or we can set up a time to talk. Please reach out to Ann Bednarz ( if you’d like to talk about life as an IT contractor.  QUESTIONS * What do you like most about being an IT contractor? * What do you like least about being an IT contractor? * What’s an ideal assignment for you? What kind of work do you like best? * What do you like to do in between assignments? How do you make the most of your time in between jobs?To read this article in full or to leave a comment, please click here Read More

How Boston Children's Hospital Hit Back at Anonymous
On March 20, Dr. Daniel J. Nigrin, senior vice president for information services and CIO at Boston Children's Hospital, got word that his organization faced an imminent threat from Anonymous in response to the hospital's diagnosis and treatment of a 15-year-old girl removed from her parent's care by the Commonwealth of Massachusetts.The hospital's incident response team quickly convened. It prepared for the worst: "Going dark" – or going completely offline for as long as the threat remained.[ More: 'Anonymous' Targets Boston Children's Hospital ]To read this article in full or to leave a comment, please click here Read More

WHITE PAPER: Citrix Systems

Gartner Magic Quadrant for ADCs
Citrix is positioned in the Leaders Quadrant for Application Delivery Controllers for the seventh consecutive year: the Gartner Magic Quadrant Report focuses on vendor's ability to solve complex application deployment challenges. Don't miss this chance to learn from Gartner's independent research. Learn More

IT Outsourcing Market Far From Stable
The demand for global IT and business process services remained steady in the second quarter of 2014, according to a recently released report from outsourcing consultancy Everest Group. A total of 416 outsourcing deals were signed during the period, almost unchanged from the 415 signed in the first quarter of this year.However, the IT and business process outsourcing market is far from stable, say the report's authors.+ ALSO ON NETWORK WORLD IT outsourcing customers mad as hell, ready to walk +Most notably, the report points out a continued and strong "anti-incumbency" sentiment among IT service buyers. During the first half of this year, companies terminated approximately 27 percent of their existing IT infrastructure deals, for example. And Sanil Dani, practice director of the global sourcing group at Everest Group, expects that trend to continue throughout the year.To read this article in full or to leave a comment, please click here Read More

Why CSO pay is too low in San Francisco, New York
Among six major U.S. cities, CSOs are paid the most in San Francisco and New York, but factoring in the cost of living makes Denver and Chicago the best bang-for-the-buck places.The median income for CSOs between April 2013 and April 2014 was $184,000 in San Francisco and New York, while Denver was $162,500 and Chicago $144,500, IT placement company Mondo reported Thursday.However, the higher salary paid in San Francisco and New York was offset by the much higher cost of living.12 jobs getting the biggest raises in 2014 According to the site Sperling's Best Places, which gives a rating of 100 to the average cost of living in the U.S., the San Francisco and New York metro areas rated 197 and 146, respectively, while the Denver metro area was 115 and Chicago 103,To read this article in full or to leave a comment, please click here Read More

Department of Labor Doing IT Consolidation, Centralization Amid Tight Budget
Dawn Leaf spends a lot of time thinking about consolidation. The deputy CIO at the Department of Labor, described a series of ongoing efforts at her organization to consolidate and standardize the IT operations in place at an array of agencies across the department during an appearance on Federal News Radio and an online question-and-answer session.The Department of Labor is still moving from a federated environment, she says: "We still don't centrally manage all IT resources." But that' s changing.When Labor embarked on its infrastructure consolidation initiative two years ago, the department's CIO office only managed IT for only around 4,000 of its 17,000 employees and contractors. At that time, Leaf says, there were nine distinct, siloed infrastructure environments.To read this article in full or to leave a comment, please click here Read More

WEBCAST: Alcatel-Lucent Enterprise

Integrating Mobility with Unified Access
Meeting mobility demands of 4500 students, faculty and staff at a university is no small task. Join this Webcast to hear the Director of Enterprise Infrastructure explain the steps Abilene Christian University took to deliver a new level of student-faculty interaction. Learn More

Federal CIOs Must Reframe Security Around Data, Access
WASHINGTON – In an era of cloud computing, increasing mobility and federal agencies outsourcing more functions to IT contractors, the traditional lines delineating a network perimeter have blurred beyond recognition, experts warn."I think best practices have to completely shift," Gus Hunt, operating partner at the private equity firm LLR Partners and the former CTO at the CIA, said this week at a government IT conference.To read this article in full or to leave a comment, please click here Read More

Why Your Company Needs Both a CIO and a CISO
It's past time for all major companies – certainly in the Fortune 500, but the advice carries on down into even medium-sized organizations – to carve out a C-level role focusing solely on security.Information security isn't just a luxury in this day and age. It's a necessity. For the longest time (and even today in some companies), security was (and is) within the purview of the CIO, a bullet point on a long list of pre-existing responsibilities and job requirements to look after.ALSO ON NETWORK WORLD: How to lure tech talent with employee benefits, perks Ignore security long enough, though, or neglect to pay it the attention it deserves, and the bad guys will pay attention to it for you: Witness what happened at Target and, more recently, at Home Depot. These incidents were very serious security breaches that let attackers gain access to sensitive payment data over a long period of time – a few weeks in the case of Target and a few months in the case of Home Depot. Consider that. Bad guys infiltrated the most sensitive of systems at a company for months, and only external entities (the banks) convinced Home Depot to look at their systems with enough of a fine-toothed comb to actually discover the breach and begin remedying it.To read this article in full or to leave a comment, please click here Read More

Rogue cell towers discovered in Washington, D.C.
Towards the end of July, ESD America, the makers of the ultra-secure CryptoPhone, said that their engineers and customers had discovered more than a dozen rogue cell towers (also known as interceptors or IMSI catchers) around the U.S.New information shows that the discovered towers might only represent a small fraction of the whole, and what's been discovered doesn't account for the mobile base stations that are only active on a limited basis.MORE ON NETWORK WORLD: Free security tools you should try Interceptors are a huge risk if used by a malicious actor. That's because once a device connects to them, the interceptor's operator can perform a number of tasks, including eavesdrop on calls or text messages, or in some cases push data (spyware for example) to the device. This is why they're only supposed to be used by law enforcement or the government.To read this article in full or to leave a comment, please click here Read More

Is a Remote-Wipe Policy a Crude Approach to BYOD Security?
While the capability to remotely wipe data from lost or stolen mobile phones may help CIOs sleep at night, it may be an outdated approach to BYOD security. Read More

Review: New Gigabit Wi-Fi options for enterprise, SMB, SOHO
Last year, we reviewed two 802.11ac access points and six 802.11ac adapters. Earlier this year, we reviewed five mobile 802.11ac devices. Now we take a look at five more 802.11ac devices that have hit the market: four access points and one wireless bridge.To read this article in full or to leave a comment, please click here(Insider Story) Read More


Sneak Peek: New features coming to Internet Explorer

Microsoft's new Developer Channel offers glimpse into upcoming features of IE.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. How to make money waiting in line for Apple's iPhone 6

2. How Google is helping me live a cellphone-free life

3. The 2014 Ig Nobel Prize winners

4. Internet of Overwhelming Things

5. Home Depot, Target breaches exploited Windows

6. Oracle founder Larry Ellison steps down

7. Cisco improves its memory by acquiring Memoir Systems

8. Microsoft boards-up research lab amid more layoff

9. Rogue cell towers discovered in Washington, D.C.

10. Larry Ellison's distractions

Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **

No comments: