Friday 3 June 2011

IRS: Top 10 things every taxpayer should know about identity theft

Cybersecurity Tipping Point? | 8 security considerations for IPv6 deployment

Network World Security

Forward this to a Friend >>>


IRS: Top 10 things every taxpayer should know about identity theft
As part of a look at the impact of identity theft and the Internal Revenue Service, watchdogs at the Government Accountability Office issued the IRS' top 10 list of identity theft information everyone should be aware of. Some of the information is obvious, perhaps, but overall even the basics of security were followed in many cases the impact of identity theft could be reduced. Read More


WHITE PAPER: Qwest

Why IT Leaders Aren't Scared of Cloud Security
Examine this CIO report in which your peers offer advice on cloud services and data protection. Learn 3 key tips for taking the right approach to securing a hybrid cloud infrastructure to dispel any data doubts. Read now!

WHITE PAPER: F5 Networks

Manageable Application Security
Investments in security solutions have to provide a clear value, which equals additional time spent collecting and documenting proof of this value. The latest version of F5 BIG-IP Application Security Manager(tm) (ASM), v10.1, addresses information overload and the need for agility in implementation. Learn more!

Cybersecurity Tipping Point?
While driving home last night, I happened to catch the NPR radio show, "On Point," and a lively discussion on hacks, cyber attacks, and cyberwar. Worth a listen, here's the link (http://onpoint.wbur.org/2011/06/01/hacks-and-cyber-attacks). This isn't the first time I've heard the mainstream media approach the cybersecurity topic but it is certainly happening more frequently these days. Why? Unfortunately,... Read More

8 security considerations for IPv6 deployment
Now that we're out of IPv4 allocations, it's time to get serious about adopting the next generation of Internet Protocol, IPv6. Read More

Lesson from SecurID breach: Don't trust your security vendor
What does a rash of attacks seemingly stemming from the RSA SecurID breach mean to most enterprises? That depends, experts say. Read More


WHITE PAPER: Diskeeper Corporation

Best Practices for Data Performance on Storage Area Networks
Because SANs work at a storage layer underneath the operating system's file system, SAN is unaware of file fragmentation and uable to solve this issue. Performance suffers. This white paper details in clear terms how, where and why Diskeeper data performance technology should be used to ensure maximum SAN performance and optimum data response time. Read more.

Checklist for a successful security assessment
A security assessment is a request to analyze the risk of an IT solution. The request is initiated by a CISO (Chief Security Officer) or ISO (Information Security Officer) within a corporation. It is used to make sure that security concerns are met before changes are made to the information technology infrastructure. There are foundation plans which evaluate the state of new applications or infrastructure. Or there are incremental plans that address changes to the foundation plan. Read More

FaceNiff Android App Allows the Clueless to Hack Facebook in Seconds Over Wi-Fi
Stealing cookies to potentially steal users' credentials just got so easy and portable that loony stalkers are probably jumping for joy. Picture this mobile-type scenario, as a person with a rooted Android smartphone casually strolls by a Starbucks, he or she taps once on a new app, and whammo, hops on and takes over Facebook profiles. Read More

Check the terms of service before you order
I just bought a new HTC Inspire 4G mobile phone and am looking for a folding, portable Bluetooth full-sized keyboard to be able to type better than via the on-screen keyboards. I've used a similar device, although not wireless, for my old Palm Pilot personal digital assistant (PDA) for many years and it's been great: it fits in a small belt case and obviates the need to carry my laptop around to meetings where I take the minutes (as I always do in committees because I type fast). Read More


WHITE PAPER: F5 Networks

Secure iPhone Access to Corporate Web Applications
This technical brief describes how the BIG-IP Edge Portal app for iOS devices provides simple, streamlined access to web applications that reside behind BIG-IP APM, without requiring full VPN access, to simplify login for users and provide a new layer of control for administrators. Learn More!

25 tech touchstones of the past 25 years
Read More

NASA amps up sonic booms to learn how to quiet them
NASA this week said it was embarking on a project that creates produce amped-up, super-loud sonic booms in an effort to understand how to minimize their impact and improve future supersonic aircraft. Read More

12 great geeky dates
From Harry Potter roller coasters to experiencing weightlessness to your local arcade Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

4G Faceoff: ThunderBolt vs. Galaxy
We tested the Verizon Wireless HTC ThunderBolt and T-Mobile's Samsung Galaxy S 4G. Here are three things we liked/disliked about each product.

MOST-READ STORIES

  1. 'Secret law' of Patriot Act
  2. Developers find a lot to love in Windows Phone 7 Mango
  3. Bluetooth touts itself as the cancer-free wireless tech
  4. Oracle proposes OpenOffice.org to Apache Incubator
  5. Computer science grads fielding 'multiple job offers'
  6. Microsoft unveils touch-oriented Windows 8
  7. SpamCop disrupts millions of e-mail accounts
  8. 10G top-of-rack switches to surge to $1 billion in sales this year
  9. IT increasingly bypassed on cloud adoption
  10. Cisco: IP traffic to quadruple by 2015

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment