Tuesday 15 November 2011

IBM targets managed security service at iOS, Android, Windows, BlackBerry smartphones

  10 petaflop Japanese supercomputer world's fastest | Do you give up a reasonable expectation of privacy by carrying a cell phone?
 
  Network World Security

Forward this to a Friend >>>


IBM targets managed security service at iOS, Android, Windows, BlackBerry smartphones
IBM is offering a cloud-based managed service for mobile devices that will let IT managers exert management and security controls over devices based on Apple iOS, Google Android, the RIM BlackBerry, Symbian and Microsoft Windows Mobile. Read More


RESOURCE COMPLIMENTS OF: GFI Software

Introducing VIPRE Antivirus Business 5.0
Finally! A high-performance endpoint security solution built with IT professionals in mind. See for yourself – try VIPRE free for 30 days.

WHITE PAPER: UPS

UPS Study: Asia High-Tech Supply Chains Prep For Change
Learn about the findings in "Change in the Chain," a 2011 study sponsored by UPS, exploring how high-tech supply chain professionals in the Asia-Pacific region are handling risk management, supply sourcing, sustainability, cost management and customer service in this evolving industry. Read Now

10 petaflop Japanese supercomputer world's fastest
As perhaps expected, the Japanese supercomputer ranked #1 on the Top 500 fastest supercomputers defended its title and today was listed again the world's fastest machine, this time hitting 10 quadrillion calculations per second (10.51 petaflops). The TOP500 list was previously announced in June 2011. Read More

Do you give up a reasonable expectation of privacy by carrying a cell phone?
Tracking via mobile devices continues to be a popular, yet extremely invasive means of electronic location surveillance with law enforcement. We looked at secret sessions that teach government and law enforcement how to hack and conduct surveillance on the masses. At that same ISS World Americas conference, there were several teaching sessions devoted to mobile devices and vendors promoting surveillance... Read More

Cerf calls Internet governance critical issue in high tech
Vint Cerf, widely considered one of the fathers of the Internet, said Monday that Internet governance is one of the most critical issues in the high-tech world. Read More


WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

Shipping-related spam rises as holidays near
I just received this alert from my company's IT department, and, while I'm sure all of you regular readers are already on your toes regarding this stuff, it might be a good time to offer a reminder to your end users ... at work and at home: Read More

F-Secure finds malware signed with stolen digital certificate
Researchers from security vendor F-Secure have spotted a rare malicious software sample that carried a valid code-signing certificate from a Malaysian governmental institution. Read More

Why healthcare IT security is harder than the rest
In this interview, security expert Gunnar Peterson explains why securing health care IT systems is quite different from other types of business IT infrastructure. Read More


WHITE PAPER: Cisco Systems

Get ROI from video collaboration
This whitepaper is designed for IT and Business leaders to understand the impact of IP video applications and technologies and the benefit of taking an architectural approach to video. View Now

Symantec's cloud-based security service supports Microsoft Lync
Symantec today widened its cloud-based security service to include Lync, Microsoft's latest instant-messaging client, so that enterprises using Lync can do anti-malware filtering and exert security controls for blocking inappropriate content along with basic data-loss prevention. Read More

Regulators sniffing around mobile privacy issues
Regulators are starting to investigate what kind of oversight is in place to make sure that mobile applications don't encroach on user privacy rights, a lawyer in Microsoft's Windows Phone segment said on Monday. Read More

Security researcher says Iran to blame for its own Duqu infections
An Iranian government official yesterday acknowledged that the Duqu attacks had infected computers in the country but claimed that the Trojan was "under control," according to a report by a state-run news agency. Read More

CA takes to the cloud for identity management
CA Technologies has gotten its feet wet with cloud-based security before, but now the company is moving further in with a package of cloud based identity and access control services. Read More

 
 
 

SLIDESHOWS

Wi-Fi security do's and don'ts
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Will IT certs get you jobs and raises? Survey says yes
  2. DARPA program to alter security authentication techniques
  3. Gartner: The top 10 strategic technology trends of 2012
  4. Cisco girds for Huawei's U.S. entry
  5. iPhone 5 rumor roll-up for the week ending Nov. 11
  6. Top 10 Android smartphone browser alternatives
  7. How IBM started grading its developers' productivity
  8. Cisco's Q1 solid, but access routers, Nexus 7000 lagging
  9. Fabric wars: Cisco vs. Brocade vs. Juniper
  10. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment