Search This Blog

Friday, January 25, 2013

"Hammered asinine requirements": Now there's a secure password

IT pros reveal the best career advice they ever received | How a Big Financial Services Firm Faced BYOD iPads

Network World Compliance

Forward this to a Friend >>>


"Hammered asinine requirements": Now there's a secure password
You're best off forgetting your grammar lessons when it comes to creating passphrases, according to new research out of Carnegie Mellon University and MIT. Read More


WHITE PAPER: Riverbed

Optimizing Hybrid Networks for SaaS
With the delay and packet loss associated with the Internet and private WANs, SaaS-based applications tend to exhibit erratic performance that can become a barrier to SaaS adoption. Learn more.

WHITE PAPER: IBM Corporation

Maximizing enterprise resource planning ROI
In this paper, we highlight the common reasons why midsize companies often do not realize significant ROI with their ERP system implementations and suggest solutions for getting the most value from their applications. Learn More.

INSIDER
IT pros reveal the best career advice they ever received
In today's culture, advice on nearly any topic - relationships, health, career - is just a mouse click, touchscreen tap or Siri query away. There's even a Web site called shouldidoit.com that promises to help you make decisions in your daily life. But while you can get some good insights on the many expert and general discussion forums that pop up on the Web, there's often a sense that something is missing from that experience. Call it the human touch. Read More

How a Big Financial Services Firm Faced BYOD iPads
With BYOD iPad security under control, financial services firm Blackstone looks toward tough challenges ahead, including the possibility of company-owned iPads and opening up its BYOD program to Android and Windows 8 devices. Read More

Symantec CEO on reorg: "our system is just broken"
Under the helm of new CEO Steve Bennett, Symantec late yesterday outlined a re-organization intended to lead to a leaner company and a new range of security and backup services and products, built primarily on internal research and development not acquisitions, within the next six to nine months. Read More

A road warrior's guide to locking down your laptop
Mobile computing may be convenient, but it's also inherently risky. When you drag your laptop to the coffee shop or bring it along on your travels, you're making all your private data and one of your most expensive possessions a big, fat target for sticky-fingered thieves. And unlike traditional theft targets like jewelry or wallets, a laptop is an easy steal--the baddies just need to wait for you to turn your back, then grab the computer and run. In some cases, a criminal doesn't even need to steal your notebook. He can simply pull your sensitive data out of thin air. Read More


WHITE PAPER: Qualys

Vulnerability Management Evolution
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized, and only providing value around audit time. How useful is a 100-page vulnerability report to an operations person trying to figure out what to fix next? Read Now!

5 Tech Skills in Lowest Demand in 2013
While the overall job market may still be difficult, it's generally better for those with technology skills. Even so, recruiters and hiring managers say some skillsets are a lower priority than others for their clients and companies. Here are the skillsets they say are the lowest priority in 2013. Read More

Android malware cases to hit 1 million in 2013
The number of distinct Android malware specimens detected will reach 1 million this year, predicts Trend Micro in its annual security roundup report, noting that the surge in Android malware has grown at a faster clip in three years than was seen in PC-based malware in its first 14 years. Read More

First-look clip of Ashton Kutcher as Steve Jobs
This is not necessarily the actor's fault, but it is exactly what I expected: This being Steve Jobs as portrayed by Michael Kelso. Read More

Android malware potentially stole up to 450,000 pieces of personal data: Symantec
A fake app store that steals personal information on Android devices may have potentially stolen between 75,000 and 450,000 pieces of personal data such as contact details, according to security firm Symantec. Read More


WHITE PAPER: HP

Storage for the Next Era of IT
This paper discusses these dynamics and explains how you can leverage technology to better capitalize on information in the context of your business. Read Now!

Flood of spam email? It may be a screen for fraud
If you get hit with an avalanche of obvious spam email, that's one problem. But it may also be an effort to distract you from a much bigger problem: fraudulent purchases and bank transactions made with your stolen identity and credentials. Read More

Big Data Brings Big Privacy Concerns
Wary of privacy implications of massive data collection systems, the Senate Commerce Committee plans to continue a probe of the industry, coinciding with a separate inquiry underway at the Federal Trade Commission. Read More

Are federal agency workers going rogue with personal devices?
Federal agencies continue to struggle with the question of whether to allow employees to use their personal smartphones and tablets at work under so-called bring-your-own-device (BYOD) policies, according to a survey out this month from the organization Telework Exchange. Read More

INSIDER
The year in tech: It's all about the cloud and SDNs
2012 has been a year of re-invention among the tech industry's biggest players, with Microsoft overhauling many of its key product lines, most notably Windows, while also boldly entering the hardware market with Surface tablets. HP slashed its workforce as CEO Meg Whitman reshaped an industry icon that has gone through many shifts in recent years. The transformation to the cloud continued practically unabated (save for those pesky outages!) and suddenly every company seemed to be a software defined something or other, or was snapping up an SDN company. Read More



SLIDESHOWS

Microsoft Office Web Apps v. Google Docs
5 reasons why Google Docs is better/5 reasons why Web Apps is better.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Open source software vs. business models
  2. Windows 8 "a much deadlier assault weapon" than Windows 7
  3. EFF backs Reddit 'gaymers' by seeking cancellation of trademark
  4. RIM's just-released BES 10 a key to enterprise mobile management
  5. Apple again posts record revenues, profits, sales
  6. 5 tech skills in lowest demand in 2013
  7. Air Force software turns warplanes into wireless routers in the sky
  8. Microsoft won't release study that challenged success of Munich's Linux migration
  9. Q&A: What the FCC's Wi-Fi expansion means for you
  10. Tech salaries jump 5.3%, bonuses flat

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: