Search This Blog

Tuesday, November 23, 2010

Microsoft Spying on Users For Free

Ultimate endpoint management tools | Cisco's 3QCY10 Global Threat Report Results

Network World Security

Forward this to a Friend >>>


Microsoft Spying on Users For Free
Are the feds one of Microsoft's best customers? Microsoft does not charge the government even a penny for surveillance of its users. Google charges $25 per user and Yahoo charges $29 per user. In November 1985, Windows 1.0 was born. Now that Microsoft Windows is 25 years old, I'm wondering if the feds are one of Microsoft's biggest and best customers? Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Tripwire

Scrambling at Audit Time?
Does your organization treat compliance as a set of check boxes designed to meet the auditors' requirements? If so, you are wasting a lot of time, money and precious IT resources. This white paper is a roadmap for making compliance a painless, efficient, and routine part of your IT processes. Read now!

Ultimate endpoint management tools
Desktop virtualization, Web apps, software as a service, and an increasingly mobile user base have created new challenges when it comes to endpoint management. Nonetheless, there are still some constants – endpoints need to be deployed, configured, patched, secured and supported. Read More

Cisco's 3QCY10 Global Threat Report Results
Adobe Reader/Acrobat, Sun Java, and Adobe Flash were the three most common exploit targets during 1H2010Cisco recently released its third quarter 2010 Global Threat Report to the public. This report highlights the trends of Malware encounters, industry vertical risks breakdown, Stuxnet worm, Rustock Botnet, SQL inject attacks, Global Spam trends and the "Here you have" email worm. Here are the highlights from the report. Malware Encounter Rates: -Enterprise businesses experienced an average of 133... Read More


WHITE PAPER: Watchguard

10 questions to ask before you buy an anti‐spam solution
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

The battle for space shots heats up on the ground
Space ports wrangle business and prep for commercial space operations It seems the scaffolding that will hold up the commercial space industry is being bolstered almost daily. Read More

China Internet 'hijack' hugely exaggerated, says researcher
The claimed 'hijack' of Internet traffic by China Telecom has been hugely exaggerated in scale and intent, a traffic analysis by Internet security company Arbor Networks has concluded. Read More


WEBCAST: Websense, Inc.

Securing the Social Web
Organizations around the world are racing to take advantage of social networking and media like Facebook, LinkedIn, and YouTube. Along with these new resources, comes new risk as user-generated content circumvents traditional security technologies such as antivirus and URL filtering. View Now

Products and privacy: Social media are changing the litigation game
Karen L. Stevenson, senior counsel, in the complex litigation group at the law firm of Buchalter Nemer recently sent me an interesting contribution following up on the articles about social network sites published in this column. Today's column is entirely her work with minor edits and an addendum from Mich. Read More

10 free iPhone apps for spectacular stargazing
There's a lot to watch in the nighttime sky -- everything from the International Space Station and meteor showers to planets and stars. There are tons of iPhone apps that can help everyone who has a little (or a lot) of astronomer blood in them watch the sky with more authority. Here we take a look at a few of the free apps that can help you out. Read More

FireCore Brings Last.FM, Web Browsing Hack to Apple TV
So far in the Apple TV 2 jailbreak saga, we've seen hacks for a weather app and even support fot Plex, although admittedly there were a few buggy setbacks. Now, software company FireCore has announced that it will be bringing both Last.FM and Web browser named Couch Surfer to the Apple TV via its own app, aTV Flash (black). Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Attachmate buying Novell for $2.2 billion
  2. The Cold War: Then and now
  3. Creepy RFID tracking coming soon to human embryos
  4. 12-year-old nails Microsoft certification
  5. 12 Ubuntu derivatives you should consider
  6. China Internet 'hijack' hugely exaggerated, says researcher
  7. Cisco co-founder now talks, lives, breathes turkey
  8. Scalpers bought tickets with CAPTCHA-busting botnet
  9. Why U.S. IT jobs aren't coming back
  10. Supercharged Android: 12 apps to boost your smartphone

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: