Friday, March 18, 2011

What do security auditors really think?

8 essential Android security apps | Anonymous: Why does the Air Force want to create phony online identities?

Network World Compliance

Forward this to a Friend >>>


What do security auditors really think?
What do auditors involved in making sure companies meet compliance requirements really think? For starters, companies don't care much about privacy and security, while encryption gets applied at a minimum to meet rules, according to a study of 505 security auditors by Ponemon Institute. Read More


WHITE PAPER: CA

Forrester: The Emergence of Service Assurance
Forrester interviewed more than 150 IT professionals to understand the fundamental issues around managing the performance of business application and business services and their underlying transactions. Read their key findings and expert recommendations. Read Now

WHITE PAPER: Polycom

Polycom Solutions for Microsoft UC Environments
Read how Polycom empowers Microsoft Unified Communications with a full suite of HD voice, video, telepresence and infrastructure solutions; Allowing organizations to increase productivity, reduce costs and unify dispersed teams. Read More

8 essential Android security apps
A DIY guide to securing Android-based devices Read More

Anonymous: Why does the Air Force want to create phony online identities?
The international collective known as Anonymous is trying to figure out just what the U.S. Air Force wants with software that can create and manage phony identities on Facebook, Twitter, LinkedIn and other social networks. Read More

Notorious spamming botnet, Rustock, takes a fall
A large network of hacked computers called Rustock, which was responsible for a great volume of spam, has shut down, perhaps as a result of another coordinated take down by security researchers. Read More


WHITE PAPER: CA

Catholic Health East Success Story
Using CA Oblicore Guarantee™, CHE has been able to automate the process of SLA reporting, build a service catalog and capture reliable IT service delivery information. The solution pulls information from originating systems to populate reports, dashboards and SLA scorecards based on defined metrics. Learn More

Are cell phones 'Stalin's dream'? Readers weigh in
Stallman is right. Stallman is a crackpot. Reactions to Richard Stallman's warnings on cell phone surveillance. Read More

Hackers learn new trick to duck Firefox, Chrome anti-phishing measures
A new phishing scam that targets bank and PayPal passwords and other consumer data that criminals use to loot private accounts is designed to beat security built in to Firefox and Chrome Web browsers. Read More

Looking for vulnerable Web sites? Try schools
Educational institutions and social networks are the worst when it comes to leaving their Web sites exposed to known vulnerabilities, with health care and banks doing the best, according to a study by WhiteHat Security. Read More


WHITE PAPER: TrendMicro

3 Top Security Vendors Put to the VDI Test
Performance tests reveal that endpoint security not specifically optimized for virtualized desktops can introduce such significant load to the VDI host; they effectively render the system unresponsive. See how Trend Micro, McAfee and Symantec compare when measuring disk utilization, CPU utilization, memory utilization and scan times. Read More

Security service on lookout for malware like ZeuS, SpyEye
Spotting notorious Trojans like SpyEye and ZeuS on compromised desktop computers is the goal of a new security service from Trusteer. Read More

Proofpoint moves into mobile mail security
The secure communications provider announced mobile extensions of its encryption and e-mail archive applications. Read More

Twitter adds option to always use HTTPS connection
With the rising awareness and concern over the stealing of passwords and other sensitive data from unsecured Wi-Fi networks, Twitter is the latest online services company to boost its use of encrypted website connections. Read More

HP CEO bets company on cloud, will offer public cloud service
HP also plans to open a marketplace that will include both applications and cloud-based services for enterprises, small businesses and consumers. Read More

Symantec to release end-to-end cloud management software
Symantec plans to release a major upgrade to its flagship storage management application, Storage Foundation 6.0, which will allow users to manage a cloud infrastructure from end to end. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Perks drive up pay for tech CEOs
Many tech vendors have shied away from extravagant perks, but there are still plenty worth highlighting. Like a $1.5 million tab for home security. Or how about the $36,619 one company paid to reimburse its CEO for the taxes he had to pay on the $106,589 he gained by using company aircraft for personal flights? Read on to find out which tech CEOs enjoyed the priciest perks in 2010 and which ones went to work perk-free.

First look at Microsoft Internet Explorer 9
Microsoft has a real competitor once again with IE9, released at midnight Monday night on Windows 7 and Vista after several months of beta testing. The focus is on speed, privacy and simplicity, with a stripped-down interface, tracking protection, pinned sites, jump lists and enhanced support for HTML5.

MOST-READ STORIES

  1. Web users bury Yahoo for botched Nate Dogg obit photo
  2. Xoom tablet pricing for Wi-Fi model sparks online debate
  3. HP "beat the crap" out of Cisco, others
  4. Google first to patch Flash bug with Chrome update
  5. Cell phones are 'Stalin's dream'
  6. RIM urges BlackBerry users to turn off JavaScript
  7. 12 cool things to do with an old iPad
  8. EFF exposes porn industry's latest copyright screw job
  9. Hackers duck Firefox, Chrome anti-phishing measures
  10. Japanese quake may shorten days

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: