Search This Blog

Friday, June 25, 2010

Protect the Data on Your iPhone 4

  Twitter settles FTC privacy complaint | Senate panel approves controversial cybersecurity bill
 
  Network World Security

Forward this to a Friend >>>


Protect the Data on Your iPhone 4
The popularity of the iPhone, combined with the small form factor of the device make it a prime target for thieves, and also make it highly unlikely that a lost iPhone 4 would be returned to its rightful owner. Make sure you set the security settings on your iPhone 4 to protect your sensitive business data and personal information. Read More


RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

WHITE PAPER: Qualys Inc.

Key questions to ask when evaluating solutions
Key questions to ask when evaluating solutions Key questions to ask when evaluating solutions

Twitter settles FTC privacy complaint
Social-networking giant Twitter has agreed to settle a complaint from the U.S. Federal Trade Commission alleging that the company deceived users and put their privacy at risk by failing to take appropriate security safeguards. Read More

Senate panel approves controversial cybersecurity bill
A U.S. Senate committee has approved a wide-ranging cybersecurity bill that some critics have suggested would give the U.S. president the authority to shut down parts of the Internet during a cyberattack. Read More


WHITE PAPER: Quantum Corporation

Building Archiving Systems to Meet Compliance Demands
For a viable archiving strategy, you need to know the regulatory landscape – and the key technologies that will help you comply using secure storage and quick data recovery. Read Now

The importance of sharing security know-how
In an ongoing effort to promote a more secure computing environment, software giant Microsoft has increased its efforts to share its in-house SDL [secure development lifecycle] practice throughout the industry. Adoption of this secure architecture would help reduce the number of vulnerabilities as well as promote continuous improvements, it said. Read More

Indian telecom tender excludes Chinese companies
A telecommunications service provider controlled by the Indian government, has excluded Chinese vendors from a tender for supply and installation of mobile telephony equipment, reflecting India's continuing concern about procuring equipment from Chinese companies. Read More


WHITE PAPER: Qualys Inc.

Justifying IT Security
The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk. Read now!

VeriSign SSL Hackable - Comodo Exposes, VeriSign Denies
Comodo announced today that it requested an independent third-party to notify VeriSign of a security vulnerability affecting its customers' web sites, including a major financial institution. VeriSign received notification by the independent third-party last Tuesday. Read More

Study: Many Harmful Android Apps Wear a Friendly Face
PCs have been the victims of malware, spyware, and viruses since their inception. Why would mobile devices be any different? Since smartphones are, essentially, becoming mini-computers, a warehouse of open-source applications is a prime target for even amateur hackers. Read More

McAfee releases new mobile parental controls utility
Regulating your child's Internet access has never been easy, and with more and more kids owning mobile devices like iPhones and iPod touches, this task has only gotten harder. Fortunately, parents are far from powerless when it comes to overseeing their children's mobile internet usage. McAfee's new McAfee Family Protection for the iPhone, iPod Touch, and iPad lets parents control and monitor how their kids access the Internet on their mobile gadgets. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

The view from the Googleplex
We recently visited the "Googleplex," Google's expansive headquarters in Mountain View, Calif., for an interview, and took the chance to snap a few pictures of life inside what must be one of the most entertaining workplaces in America.

Network access control in a nutshell
Twelve leading NAC products were put to the test. Here's what we found.

MOST-READ STORIES

  1. Google Voice no longer an invitation-only affair
  2. Meet the father of Google Apps (who used to work at Microsoft)
  3. Apple leaves iPad vulnerable after monster iPhone patch job
  4. Cisco announces the CCIE Emeritus Program
  5. More than a quarter of iPhones break within two years
  6. 40/100G Ethernet standard ratified
  7. VeriSign SSL hackable - Comodo exposes, VeriSign denies
  8. Open-sourced textbooks could ease college costs
  9. Visiting the Googleplex
  10. Ultimate guide to network access control products

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: