Search This Blog

Wednesday, October 26, 2011

Offshoring and Security: IT Managers, Network Admins Divided on Risk

Everything Should Be Secret | Air Force wants to understand impact of automated systems the human psyche

Network World Security

Forward this to a Friend >>>


Offshoring and Security: IT Managers, Network Admins Divided on Risk
A recent survey reveals that more than one-third of respondents whose companies offshore IT said the practice makes their organization less secure, while the same proportion said the opposite. Overall satisfaction with offshore results overall may explain the discrepancy. Read More


RESOURCE COMPLIMENTS OF: Cisco Systems

Context-Aware Security for BYOD Trend
Concerned about the "Bring Your Own Device" (BYOD) trend? Although an "Any Device" environment is becoming essential for today's workplace, new risks and problems may result if your infrastructure isn't ready. Join IDC's Chris Christiansen and Cisco Systems as they discuss security architecture and solutions to address challenges for BYOD. Register Now

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn More!

Everything Should Be Secret
Meru Networks' yesterday announced of a number of enhancements to their product line, mostly notably for our purposes here Smart Connect additions to their Identity Manager product. The key news is new facilities for dealing with the rapidly-increasing volume of users appearing as a result of BYOD, and in securing connections even for guest users. Read More

Air Force wants to understand impact of automated systems the human psyche
When I think if the United States Air Force I don't typically think of it worrying too much about the human psyche. But in this case, the Air Force says it wants to begin studies that look at the psychological, neurological, or contextual elements of human reliance on autonomous systems. The idea, the Air Force says is to identify general principles of human trust. Read More

Visa, MasterCard may take offline buying history and drag it online for targeted ads
Do you carry cash, or do you buy almost everything with a credit card, perhaps with a debit card backed by a credit card firm such a Visa? If you swipe plastic to pay, do you consider your offline transactions to be private or separate from your online life? If you use Visa or MasterCard, then those credit card companies know a great deal about you and would like to start using what they know about... Read More


WHITE PAPER: IBM

Leveraging security from the Cloud
Cloud computing is a flexible, cost-effective and proven deliv-ery platform for providing business or consumer IT services over the Internet. This whitepaper discusses the who, what, when, why and how of cloud-based security services. Read Now

IBM turns up Watson-like natural language healthcare analytics
IBM today said it was rolling out software that will help doctors and insurance companies reduce costs by better analyzing and managing huge amount of patient data. Read More

Database Security: More Than DAM
Sensitive data is stored in lots of places like email systems, endpoint devices, and file servers, but most organizations store the majority of their confidential information in databases. This situation places database security at a premium. Read More

Spammers create their own URL shortening services
Spammers have created their own services to shorten URLs (uniform resource locators) in an apparent attempt to circumvent security measures in place at well-known shortening websites, according to Symantec. Read More


WHITE PAPER: Trend Micro

Common Hybrid Cloud Use Cases
The best-of-both-worlds approach of hybrid clouds lets businesses take advantage of public cloud to reduce costs while leveraging private clouds to keep mission-critical workloads inside the organization. Understand hybrid cloud best practices and the additional security measures needed to mitigate any risks. View Now

Bank adopts 'security data warehouse' to fight persistent security threats
Zions Bancorporation has set up a massive repository for proactively analyzing a combination of real-time security and business data in order to identify phishing attacks, prevent fraud and ward off stealthy hacker incursions known as advanced persistent threats. Read More

Chrome bug no security threat, argues Google
Google's Chrome contains a critical vulnerability that under certain circumstances allows attackers to plant malware on a Windows PC, a security company said last week. Read More

Google pays record $26K in Chrome bug bounties
Google paid out a record $26,511 in bug bounties to researchers who reported some of the 18 Chrome vulnerabilities patched today. Read More

After the iPod, ex-Apple engineers built world's coolest thermostat
So what do you do after you've helped build the IPod? Build wicked cool thermostats of course. That's what ex- Apple engineer Tony Fadell, who is now the founder and CEO of Nest, which this week rolled out its Learning Thermostat. Fadell is considered the creator of the iPod. Read More



SLIDESHOWS

20 high-tech toilets
Today's techiest toilets incorporate music players, motion-activated lids, heated seats, washing and drying functions, and more. Take a look.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Double security whammy: Killer SSL DDoS attack, XML encryption broken
  2. Wi-Fi devices crowd 2.4GHz band; IT looks to 5GHz
  3. Week 1: Ubuntu Unity instead of Windows 7 and ready to scream
  4. New copper theft foil: Bust the drivers
  5. Linux 3.1 is out and supports OpenRISC, NFC, Wii
  6. Gartner: 10 key IT trends for 2012
  7. iPad 2 vs. business class tablets
  8. Microsoft's YouTube channel gets hijacked and wiped clean
  9. High-speed Ethernet planning guide
  10. iPhone 5 rumor rollup for the week ending Oct. 21

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: