Search This Blog

Thursday, May 21, 2009

iPhone Security, Part 2

Hard drive with Clinton-era data missing from National Archives; iPhone security, Part 1
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by Ultrium
rule

Reduce the Risk of a Data Breach
Silverton Consulting says most data centers should consider device data at-rest encryption for sensitive backup tapes. If you rely on tapes to back-up your private business data then the risk of tape theft is real. Using LTO-4 data encryption eliminates the risk of data loss, even if tapes are stolen.

rule

Spotlight Story
iPhone Security, Part 2

Steinberger: Based on my personal observation and analysis, the main security constraints imposed by the iPhone Operating System are as follows. Read full story

Related News:

Credit card council looks into cloud security
Cloud security is enough of a potential problem that it's being investigated by the group that sets standards for protecting credit card data.

Hard drive with Clinton-era data missing from National Archives
An external hard drive thought to contain nearly 1TB of data -- some of it sensitive information -- from the Clinton Administration is missing from the U.S. National Archives and Recording Administration.

iPhone security, Part 1
My friend and colleague Adjunct Professor Richard Steinberger from the MSIA Program at Norwich University sent me an e-mail note recently about the interesting security model used by Apple for its mobile devices. I invited him to expand on his thoughts and am delighted to present his analysis today. Everything that follows is entirely Ric's work with minor edits.

Advanced algorithms enlisted to fight cyberwars
First Estonia. Then Georgia. Increasingly, the theoretical potential for cyberwar is becoming hard reality. One new report argues that the unchecked proliferation of cyber warfare weapons is comparable to that of nuclear warheads. At least one branch of the US military, United States Navy takes the threat seriously and monitors cyber threats on a daily basis.

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.


Evolution of Ethernet
Evolution of EthernetFrom 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Beyond consolidation: five reasons why you should start virtualizing
Virtualization isn't just for large enterprises. Small and midsize businesses (SMBs) are finding that virtualizing servers can be a viable IT strategy. And although server consolidation is the primary reason many organizations are initially attracted to virtualization technology, it's hardly the only driver. Why else does it make sense for SMBs to virtualize? Here are five reasons from the experts—your IT peers and industry analysts.
Read this article today.


Create Your Own Agenda at IT Roadmap
Customize a day of learning just for yourself! Attend IT Roadmap Conference & Expo and explore new solutions and examine new technology across 10 relevant areas of IT. Security, Virtualization, SaaS, VoIP, Green IT and more. 10 U.S. cities in '09.
Select your city, register and attend free

 

May 21, 2009

TOP STORIES | MOST DUGG STORIES

  1. Domain name company cries croc tears over 'censorship'
  2. Why BlackBerry still beats iPhone for some
  3. Death of the mouse
  4. Leaked copies of Windows 7 RC contain Trojan
  5. RIM to bind BlackBerry to Cisco phones
  6. Top 7 reasons people quit Linux
  7. Citrix embraces Apple with iPhone virtualization
  8. Give users passwords they don't have to remember
  9. Cisco cool to Obama's tax loophole plan
  10. Use the Cisco restroom at your own risk

2009 Fave RavesNetwork World on Twitter: Get our tweets and stay plugged in to networking news

MOST-WATCHED VIDEO

  1. Notebook replaces trackpad with LCD panel

IBM® Smart SOA™ Approach for Smarter Business Outcomes
As your business model changes — and these days, change is the only constant — you need the flexibility to adapt effectively. Enter service oriented architecture (SOA), a business-driven IT approach that helps you see change coming and use it to your advantage.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: