Monday, April 27, 2009

The FBI as an ethical hacker? Security: The ugly business

New surveys on small business security and success; Managing mobility is all about details: Part II; More iPhone juice, less bulk
Network World logo

Voices of Networking

NetworkWorld.com | Network Management Research Center | Update Your Profile


Sponsored by APC
rule

Optimizing the Data Center
The Editors of Network World present this Executive Guide: Taking Virtualization Up a Notch. Read it and find out what you need to know about virtualization as it creeps into every corner of your data center. Learn More!

rule

Spotlight Story
The FBI as an ethical hacker?

Scott Bradner By Scott Bradner
More details are emerging about how the FBI engages in hacking and the planting of spyware. Read full story

Related News:

Gaskin: New surveys on small business security and success
Understanding small business is tough because there are so many of them and they vary so widely. But all small businesses share certain problems, attitudes, and approaches to those problems. Let's give a hand to ...

Backspin: Security: The ugly business
Security problems usually don't have elegant solutions. A report from Commonwealth Bank concerning serious ATM vulnerabilities illustrates the issues perfectly.

Gearhead: Analyzing Twitter with Excel, Part 4
This week Mark Gibbs wraps up his quest to analyze Twitter data using Excel gets results despite loads of "gotchas". Ugly results it is true but results nonetheless.

Johnson: Managing mobility is all about details: Part II
Last week, we talked about some great ways to get your arms around the challenge of managing the mobility initiative inside your organization. We covered the components of a mobile strategy and the need for device standardization, contract consolidation and user-profile-based issuance of devices. But as I said, there's more. What follows are some additional components of an effective mobility policy.

Cool Tools: More iPhone juice, less bulk
The Juice Pack Air, by Mophie, is a rechargeable external battery case that gives you extra battery juice will providing additional protection for you iPhone 3G smartphone.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by APC
rule

Optimizing the Data Center
The Editors of Network World present this Executive Guide: Taking Virtualization Up a Notch. Read it and find out what you need to know about virtualization as it creeps into every corner of your data center. Learn More!

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

04/27/09

Today's most-read stories:

  1. Some IT skills see pay hikes during downturn
  2. Researchers show how to take control of Windows 7
  3. The evolution of Ethernet
  4. Intel CPU cache poisoning: dangerously easy on Linux
  5. The downfall of Sun
  6. Einstein systems to inspect U.S. government's Internet traffic
  7. Microsoft posts historic revenue stumble in quarterly earnings
  8. Apple dismisses netbook trend
  9. Cloud computing a 'security nightmare,' says Cisco CEO
  10. Top 10 technology skills
  11. VMware launchers vSphere


Network World on Twitter: Get our tweets and stay plugged in to networking news


Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: