Friday, August 31, 2012

Toyota accuses fired worker of major security breach

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more | vCloud vs. vSphere: VMware explains security changes

Network World Compliance

Forward this to a Friend >>>


Toyota accuses fired worker of major security breach
Car maker Toyota has filed a lawsuit against a worker it claims attacked the company's US parts supply website as retribution for being fired. Read More


WHITE PAPER: IBM

IBM InfoSphere: Solutions for Insurance
By creating a single, 360-degree view of the customer with IBM InfoSphere Master Data Management, insurance companies can gain a deeper understanding of customer needs, develop targeted marketing campaigns, adapt to consumer trends and enhance the efficiency of operations. Learn More.

WHITE PAPER: HP & Intel

Gartner Magic Quadrant for Blade Servers
The market for blade servers is becoming ever more complex and diverse due to the convergence of related modular form factors, a fast-growing interest in fabric-based infrastructure and the influence of cloud computing on buying behavior. Download the Gartber Magic Quadrant to see how the vendors in blade servers stack up. Read Now!

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more
Before their corporate jobs, many tech CEOs got their hands dirty, scrubbing oils stains off asphalt, cleaning bathrooms, and shoveling monkey cages. Here are their stories. Read More

vCloud vs. vSphere: VMware explains security changes
In unveiling its VCloud suite at its annual conference this week, VMware took pains to explain how the security model for it differs significantly from that of its existing vSphere cloud computing virtualization operating system both in terms of functionality and naming conventions. Read More

INSIDER
Why passwords are failing us -- still!
Three decades into the digital revolution, passwords are still complicated, ineffective and a drain on IT's resources. What gives? Insider (registration required) Read More

Oft-cited cybercrime cost estimates hosed down
There is general agreement that the worldwide cost of cybercrime is in the hundreds of billions. But just how many hundreds of billions is a matter of debate, following a ProPublica report that questioned the most widely quoted estimates by two major security vendors. Read More


WHITE PAPER: Dell

Management Madness: How to Manage Mobile Devices
There are six major mobile operating systems in use now and each one offers its own set of security and management challenges. The resources in this Mobility KnowledgeVault will help you keep these devices secure on the corporate network with expert tips on management tools, endpoint security software, increasing application support and more. Learn More

Leaky web sites provide trail of clues about corporate executives
You can read about Zappos' CEO Tony Hsieh on the company's Web site-- about how he sold his first company, LinkExchange to Microsoft in 1999, at the age of 24, and joined Zappos as an advisor and investor, eventually rising to the company's top post. What you might not learn is that Tony is an exercise enthusiast who gets his gear from Nikeplus.com, watches his favorite shows on the Internet streaming site Hulu, keeps up with his friends on Facebook and checks the value of his Amazon.com stock (Amazon bought Zappos in 2009) at Marketwatch.com. That lesser known information about Hsieh -- a treasure trove for hackers -- is public, all the same: leaked from e-commerce and social networking sites linked to the CEO's @zappos.com e-mail address. Read More

Products of the week 8.27.12
Our roundup of intriguing new products Read More

Cloud security company Zscaler attracts $38 million in funding
Cloud-security provider Zscaler Thursday announced it has received $38 million in venture-capital funding, naming Lightspeed Ventures as a strategic investor but not the other venture-capital partners involved in the round. Read More

Java security threats: What you need to know
First, the bad news. Once again, Mac users are at risk due to a flaw in Java, similar to the one that enabled the Flashback Trojan. Even worse, there isn't (yet) a patch to fix that vulnerability. But don't worry: This time around, there's good news for Mac users: Thanks to changes Apple has made, most of us are likely to be safe from this threat. Read More


WHITE PAPER: McAfee

Top 4 Security Surprises That Await Private Cloud Builders
This report published by Gabriel Consulting Group discusses security risks that prospective private cloud builders might be overlooking. Learn more.

Security Manager's Journal: Closing off a hole in Outlook
With Outlook Anywhere, users can download their mail to untrusted PCs and leave sensitive documents behind. Read More

IT's 9 biggest security threats
Hacking has evolved from one-person crime of opportunity to an open market of sophisticated malware backed by crime syndicates and money launders Read More

18 great IT tools for Android
These Android apps, from network sniffers to SNMP MIB browsers to SSH tools, will come in handy for network and IT pros Read More

How to handle a digital-certificate fraud incident
Are you prepared to deal with a security incident involving digital-certificate fraud? You should be, because if it happens, it might well involve the need to replace thousands of digital certificates used for security by your organization in applications or for other purposes. Here's how to prepare for bad news and be ready to respond when criminals undermine the complex public-key infrastructure (PKI) ecosystem. Read More

Phishing attack targets users with fake BlackBerry ID email
Security vendors say they've spotted phishing attacks trying to fool BlackBerry users into opening email on their Windows machines that launches malware for taking over the system. Read More



SLIDESHOWS

Hot Products at VMworld 2012
Click through all the products being released at VMworld in San Francisco this week.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Windows 8 is awesome ...
  2. 18 great IT tools for Android
  3. James Bond chooses Sony Xperia T over iPhone 5
  4. Second Java zero-day found: Time to disable it, say experts
  5. Tech CEOs' first jobs
  6. 5 reasons Android users will switch to the iPhone 5
  7. HP announces Envy X2 tablet-laptop hybrid device with Windows 8
  8. VMware joining OpenStack delayed, for now
  9. Six ways to protect against the new actively exploited Java vulnerability
  10. Juniper dumps BitGravity CDN tech

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: