Search This Blog

Tuesday, December 22, 2009

Obama selects tech veteran for top cybersecurity post; 7 big IT orgs that showed Microsoft the door

Microsoft rebels: Seven stories of users who abandoned Redmond; Obama cyber czar choice worries about smartphones, social networking
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by ArcSight
rule

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved.

Building a Successful Security Operations Center

rule

Spotlight Story
Obama selects tech veteran for top cybersecurity post

Howard Schmidt was named today as the White House's cybersecurity coordinator, a job that was reportedly difficult to fill as the U.S. strengthens its computer security defense. Read full story

Related News:

Microsoft rebels: Seven stories of users who abandoned Redmond
Seven stories of large organizations -- in the U.S. and abroad -- that abandoned Redmond's software for alternative products.

Obama cyber czar choice worries about smartphones, social networking
In choosing Howard Schmidt as cyber czar President Obama has gotten someone who has held a similar job in a previous administration, has varied experience at high-level corporate jobs, was a frequent panelist at security conferences and who has even written a book on defending the Internet.

Report: Russian gang linked to big Citibank hack
U.S. authorities are investigating the theft of an estimated tens of millions of dollars from Citibank by hackers partly using Russian software tailored for the attack, according to a news report.

2009: Social networks go mainstream
Social networks entered the big time in 2009 as tools once used only by teenagers and college students were widely embraced by their parents and grandparents.

Google and Microsoft to escalate war in 2010
One of the most heated battles among technology companies was waged this year between Microsoft and Google, but industry watchers say this is just the beginning of a long-term struggle between the two companies.

Microsoft's 'whitelist' helps hackers, says Trend Micro
By recommending that users exclude some file extensions and folders from antivirus scans, Microsoft may put users at risk, a security company said today.

Virtualization security remains a work in progress
While adoption of server virtualization is proceeding at a gallop, the effort to refine virtualization security reached only a slow trot in 2009.

A stiirring defense of print media's future
Quentin Hardy at Forbes.com has a thought-provoking answer to those (like Steve Ballmer) who see not only a continued decline of print media but its actual extinction.

NASA's giant flying telescope gets real windblown
NASA opened the aircraft doors on its giant flying space observatory for the first time in flight, with the idea of letting engineers understand how air flows in and around its 98-inch infrared telescope.

Indian industry frowns on employees using social networks
Close to 12.5% of the productivity of employees in India is lost daily as most of them while away their time on social networks, according to a survey by a large industry association in the country.

Today from the Subnet communities

On Cisco Subnet: Endpoint Security: As Important in 2010 As Ever and Analyst shares thoughts on Cisco competitor Avaya; On Microsoft Subnet SQL Server? Bah humbug!; On Google Subnet: Google " Dashboard" addresses privacy.

Network World on Twitter? You bet we are


Decade in tech
Ethernet everywhereHere is a quiz on the most important or quirkiest tech stories to hit the front pages over the first 10 years of the 2000s.

Cool Yule Tools
Windows 7Best picks from this year and a look back at 10 years of tech toys and gadgety gifts.

Mobile Security: The Essential Ingredient for Today's Enterprise
Software and technology solutions help mitigate security risks and safeguard from threats, but they require IT staff to select, deploy and maintain them. Problem is, today's IT environments are lean. This paper examines the current mobile security landscape, including myths surrounding the risks and threats, and how organizations can establish a solid mobile security strategy.
Learn More


 

December 22, 2009

MOST-READ STORIES

  1. Caught on tape: Burglars target wrong techie
  2. Microsoft's 'whitelist' helps hackers, says Trend Micro
  3. Avaya credit rating dropped to junk status in wake of Nortel buy
  4. What's next for MPLS?
  5. Review: VDI shootout
  6. Texting drivers are more dangerous than talkers
  7. Is Windows 7 the last major chapter in Windows story?
  8. The 10 best Chrome extensions for work and play
  9. HP: Our Webcams aren't racist
  10. Twitter's own account caused blackout, says DNS provider

Advancing the Economics of Networking
Aging network systems and old habits have dictated how businesses spend their IT budgets. As a result, a large percentage, if not a majority, of IT dollars are being spent to merely "stay in the race" and keep pace with the competition. Juniper Networks® proposes to change this economic model.
Find out how



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: