Search This Blog

Monday, June 28, 2010

Quiz: Do you know IT security?

  Cisco survey finds 20-somethings favor insecurity | Advanced best practices for managing smartphones
 
  Network World Security

Forward this to a Friend >>>


Quiz: Do you know IT security?
Security is the No.1 priority for corporate networking executives, which means staying on top of the broad range of technologies used to fulfill the predominant model of network protection - defense in depth. Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more. Keep track of your score and see how well you do at the end. Read More


WHITE PAPER: Quantum Corporation

Building Archiving Systems to Meet Compliance Demands
For a viable archiving strategy, you need to know the regulatory landscape – and the key technologies that will help you comply using secure storage and quick data recovery. Read Now

RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

Cisco survey finds 20-somethings favor insecurity
Cisco this week released results of a security survey that explored the impact of social networking and the use of personal devices in the workplace. It found that employees are regularly looking for ways to circumvent company IT security policies to use unsupported devices and applications. Read More

Advanced best practices for managing smartphones
Last week's article provided a summary of best practices for the basic management of smartphones in your organization. Going a step or two beyond the basic management techniques, Fiberlink Communications now provides us with best practices for more advanced management of the ubiquitous mobile devices that have become more computer than phone. Read More

The Devil Is In The Details: DHS Monitoring Web & "Wrong" Words
Cyber-terrorists and the dreaded cyberwar has escalated to the point of the "feds" pulling the plug on the Internet in case of an emergency. Then DHS Secretary Janet Napolitano said that in the future there will be "increased" Internet monitoring of U.S. citizens due to the dangers of homegrown terrorism. Read More


WHITE PAPER: Qualys Inc.

Justifying IT Security
The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk. Read now!

Dot-XXX Domain Won't Clean Up the Web
ICANN has approved XXX as a top-level domain. The adult entertainment industry will soon have its own glaringly obvious domain, but unfortunately that doesn't necessarily mean that dot-COM domains will suddenly be porn-free. Read More

OpenDNS launches family protection
OpenDNS has launched a home protection service Read More

Senate committee to investigate data retention by ISPs
A Senate Committee will launch an inquiry into the collection of online data by Government agencies and private companies, including Internet service providers (ISPs). Read More


WHITE PAPER: IBM Corporation

Rethinking PCI Requirements
When compliance validation activities are executed in house, company officials become fully liable for any omissions or errors. Using a third-party vendor can shift the risk away from corporate management. Learn how IBM can become your trusted partner for PCI compliance. Learn More

Congress Asks Apple to Explain its Privacy Policy
Reps. Edward J. Markey (D-Mass.) and Joe Barton (R-Texas) are asking tough questions of Apple CEO Steve Jobs about recent changes to the company's privacy policy. The two congressmen sent a letter to Jobs on Thursday asking the company to explain its privacy changes and how they comply with user privacy safeguards built into Section 222 of the Federal Telecommunications Act. Read More

Interesting Audience Data from the Symantec Government Symposium
Earlier this week, I participated in the Symantec Government Symposium, an event dedicated to IT and security professionals in the U.S. Federal government. As part of her kickoff presentation, Symantec Federal GM, Gigi Schaum, asked for audience responses to three questions. Here are the questions and the interesting responses: 1. Has the state of cybersecurity improved over the last 12 months?... Read More

Microsoft, Where Is Your Privacy Dashboard?
If Microsoft would focus its scattered efforts, it might become a powerhouse to compete with Google's growing power and to give Apple a black-eye too. Microsoft has the masses, the user base, because, at least for now, most of the world runs on Windows. Because of that fact, Windows is the low hanging fruit and prime hacking target. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

The view from the Googleplex
We recently visited the "Googleplex," Google's expansive headquarters in Mountain View, Calif., for an interview, and took the chance to snap a few pictures of life inside what must be one of the most entertaining workplaces in America.

Network access control in a nutshell
Twelve leading NAC products were put to the test. Here's what we found.

MOST-READ STORIES

  1. Quiz: Do you know IT security?
  2. Super software secrets
  3. Beyond the petaflop: DARPA wants quintillion-speed computers
  4. iOS 4's hidden features
  5. Apple 4 opening day: Not all is iPhone-tastic
  6. VMware's Maritz: OSes are having their jobs stolen
  7. Report: Users find yellow discoloration on iPhone 4 screens
  8. How HTML5 will change the Web
  9. Google Voice: 10 reasons to check it out
  10. iPhone vs. Droid vs. BlackBerry

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: