Search This Blog

Tuesday, July 26, 2011

Sexting: Pervasive cameras + Internet = Autoporn

Confusing array of security job titles complicates Pentagon cyber warrior strategy | The 5 biggest IT security mistakes

Network World Security Strategies

Forward this to a Friend >>>


Sexting: Pervasive cameras + Internet = Autoporn
Got kids? Think they're too sensible to send nude or seminude pictures of themselves to their buddies? Read More


WHITE PAPER: Red Hat

The Linux Factor
Linux offers robust security—required by many government applications—and provides unprecedented value because of its hardware and application independence, according to recent research. Read this white paper to see how its cost savings, security and flexibility can benefit your organization. Read More

WHITE PAPER: CA Technologies

CIOs Feel the Pressure to Optimize the Online Experience
In this exclusive survey, CIOs weigh in on the business impact of application performance. This white paper presents the survey results and offers guidance on building a business case to optimize the customer experience with consistently excellent application performance. Learn More

Confusing array of security job titles complicates Pentagon cyber warrior strategy
As the US Department of Defense wrangles with cybersecurity and organizes for potential online warfare, it faces a number of big challenges - not the least of which is managing to get the right people in the right jobs. But with the DoD such a task isn't so easy. Read More

The 5 biggest IT security mistakes
Like cleaning the windows, IT security can be a thankless task because they only notice when you don't do it. But to get the job done in the era of virtualization, smartphones and cloud computing, you've got to avoid technical and political mistakes. In particular, here are five security mistakes to avoid. Read More

Want Real Wi-Fi Security? Aruba's Got It
Having worked in government high-security environments, two things come to mind: how seriously security needs to be taken here (mistakes are simply not allowed), and how wireless LANs to date have been forbidden in most of these applications, even with cumbersome and expensive external crypto units. Read More


WHITE PAPER: IBM

Delivering Information you can trust
This whitepaper rovides an overview of the current data quality problem and describes how IBM® InfoSphere® Information Server for IBM System z® can become your foundation for data quality and make a big difference in helping you derive more value from the complex, heterogeneous information spread across your systems. Read Now

20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
From IT geeks winning millions to Google mush-brain syndrome, 2011 is shaping up to be one wacky year Read More

Heathrow to install facial recognition scanners
The U.K.'s largest airport, Heathrow, will install facial recognition scanners by September for international and domestic passengers to prevent illegal immigration in the country. Read More

UnboundID releases SCIM toolkit beta
One place you could have gone to escape the recent heat wave that encompassed most of the U.S. was Keystone, Colo., where the afternoon temperatures barely reached the mid-70s F (while here in the mid-Atlantic we were stretching from the mid-90s to 100 or so). And while you were there you could have attended the Cloud Identity Summit, ably organized by Ping Identity's Andre Durand. Read More


WHITE PAPER: EMC

The Mandate for Converged Infrastructure Management
Converged infrastructure is changing the way data centers roll out infrastructure resources and providing a clear and achievable path to cloud computing environments. Effective management of infrastructure is a key capability that can significantly impact the degree of success for data centers going the converged route. Read more

Shrinking IT staff leaves security projects in the lurch
Lately, I've been struggling with trying to get resources for my security projects. As my security program continues to grow and develop, I'm at the stage where I'm rolling out new security technologies, but I'm starting to run into roadblocks when it comes to getting server, network and desktop team support. It's ironic: I got the budget I need to buy security technologies, and I bought the products, but they're not installed yet because we don't have people available to do it. Read More

Is your IT support making you vulnerable to hackers?
Data breaches are more prevalent and more costly than ever. Smarter technologies seem to breed smarter hackers, making it difficult for IT to keep up. But sometimes IT unwittingly helps the bad guys by improperly using core tools, such as remote support mechanisms. Read More

The business-security disconnect that won't die
When it comes to protecting sensitive data, security always seems to be a step behind the business -- despite everything you've heard. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
From IT geeks winning millions to Google mush-brain syndrome, 2011 is shaping up to be one wacky year.

MOST-READ STORIES

  1. 10 wicked off-the-cuff uses for retired NASA space shuttles
  2. 15 incredibly useful (and free) Microsoft tools for IT pros
  3. 10 technologies that will change the world in the next 10 years
  4. 20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
  5. iPhone 5 rumor roll-up for the week ending July 22
  6. Analog Gear That Makes Us Nostalgic
  7. Adobe software breaks down on Mac OS X Lion
  8. Is wireless making us nuts?
  9. Alcatel-Lucent confirms Enterprise business may be sold
  10. Google: Sun offered to license Java for $100 million

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: