Search This Blog

Tuesday, November 24, 2009

Information security and business strategy Part 1

Google Chrome OS: Big Brother Google Gets Bigger; Third iPhone worm targets jailbroken iPhones
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by IBM NWW
rule

Staying a step ahead of the hackers
Security managers may work for midsize or large organizations; they may operate from anywhere on the globe. But inevitably, they share a common goal: to better manage the risks associated with their business infrastructure.

Learn More

rule

Spotlight Story
Information security and business strategy Part 1

I've known David Greer for over 25 years and have always enjoyed his intelligence, good humor and creativity. And Stephen Northcutt is so widely published, cited and respected in our field that I had trouble deciding which of his many Web sites to cite. It is a great pleasure to publish Greer's interview of Nortcutt in two parts. Read full story

Related News:

Google Chrome OS: Big Brother Google Gets Bigger
Google's mantra is "Don't be evil." Let's hope it the tech giant means it, because if Chrome OS succeeds in replacing Windows at the world's dominant operating system, Google's sway over the computing world could be exponentially higher than it is today.

Third iPhone worm targets jailbroken iPhones
Another week, another worm hitting jailbroken iPhones. As with the previous exploits, which Rickrolled your phone's wallpaper and stole your data, this nasty piece of work burrows its way into your jailbroken device if you haven't changed the password for the iPhone's root account--you have changed your root password, right? Right?

IBM smartphone software translates 11 languages
Researchers at IBM say they have created smart software that that translates text between English and 11 other languages including Chinese, Korean, Japanese, French, Italian, Russian, German, Spanish, Portuguese, Italian and Arabic.

Cisco's free iPhone app grabs security feeds
Cisco has made available a free iPhone app that can be used to receive over a dozen security-related information feeds in customizable form related both to Cisco products and to general security topics, such as newly detected threats.

Five ways to lose your identity (and wallet) this holiday season
Computerworld offers tips to holiday shoppers looking to expose their personal data to online thieves.

Three indicted for Comcast hack last year
Three hackers have been indicted for redirecting the Comcast.net Web site to a page of their own making in 2008.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Beyond Security: Application Control
Fortinet's custom-built FortiGate platforms deliver integrated, high-performance security technologies that provide defense-in-depth against malicious or unwanted applications without sacrificing network performance. FortiGate platforms are purpose-built, combining the power of the proprietary FortiOS security operating system with the proprietary FortiASIC network and content processors. FortiGate platforms deliver proven, integrated protection without compromise.
Get this White Paper now!


Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More

 

November 24, 2009

MOST-READ STORIES

  1. New attack fells Internet Explorer
  2. Steve Jobs is a man of a few words
  3. Oddball gifts for uber geeks
  4. Global warming research exposed after hack
  5. Google adding IPv6 to YouTube
  6. The 5 best, and 5 worst, features of Google Chrome OS
  7. Cisco's free iPhone apps grabs security feeds
  8. Microsoft Windows chief decries standards grandstanding
  9. Federal government using PS3 to crack pedophile passwords
  10. Top 10 free Windows tools for IT pros, at a glance

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: