Computerworld Security
May 14, 2009
___________________________________________________________
***************SPONSOR**************************************
How to Combat the Top Ten Problems Network Techs Encounter
Keep your network up and running at top speed. Networks today have evolved
quickly to include business critical applications and services, relied on
heavily by users in the organization. This whitepaper discusses ten common
problems encountered by technicians today and their symptoms, causes, and
resolutions.
http://cwflyris.computerworld.com/t/5022900/283856143/189617/0/?3e076d18=YXVzdGluYW1lczIwMDgucGNtYWdAYmxvZ2dlci5jb20%3d&x=b09aaff5
************************************************************
In this issue:
1. Microsoft puts Mac users at risk with patch policy, says researcher
2. Google suffers major failure
3. Steven J. Vaughan-Nichols: Google down!
4. Most claims dismissed in Hannaford data breach suit
5. Full Disk Encryption Comes to Workgroups
6. Twitter Tips: Three Ways To Deal With Twitter Spam
OTHER RESOURCES
_______________
Bringing Order and Security to your Mobile Workforce
http://cwflyris.computerworld.com/t/5022900/283856143/180599/0/
The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164
http://cwflyris.computerworld.com/t/5022900/283856143/187181/0/
How to Optimize Your Capture Workflow
http://cwflyris.computerworld.com/t/5022900/283856143/187240/0/
_______________
Microsoft puts Mac users at risk with patch policy, says researcher
A security researcher has called foul on Microsoft for doing just what it has
thrashed hackers over for years: revealing information that can be used by
hackers to hijack computers before a patch is available.
http://cwflyris.computerworld.com/t/5022900/283856143/190734/0/
Google suffers major failure
Various Google products, including the hosted Google Apps applications, were hit
with outages this morning.
http://cwflyris.computerworld.com/t/5022900/283856143/190735/0/
Steven J. Vaughan-Nichols: Google down!
Users from around the U.S. and the world are all reporting that Google, and its
related services, are moving at snail-like speed.
http://cwflyris.computerworld.com/t/5022900/283856143/190736/0/
***************SPONSOR**************************************
Tackling Identity Data with Identity Hub
How an application consumes identity data is one of the most challenging aspects
of developing an identity-enabled application. Identity Services, a key
mechanism behind Service-Oriented Security, enable developers to easily reuse
many common identity functions. This paper takes a closer look at the issues
surrounding the patterns for accessing identity data and what an ideal Identity
Hub should provide for developers.
http://cwflyris.computerworld.com/t/5022900/283856143/189515/0/
************************************************************
Most claims dismissed in Hannaford data breach suit
All but one of the legal claims filed against Hannaford Bros. -- the Maine-based
retailer that suffered a security breach exposing some four million credit and
debit cards -- has been dismissed.
http://cwflyris.computerworld.com/t/5022900/283856143/190737/0/
Full Disk Encryption Comes to Workgroups
Losing your laptop can be expensive in three ways. First, you'll spend hundreds
or thousands of dollars to replace the hardware. Second, you'll suffer the time
and aggravation of restoring your data, all the while hoping you have everything
backed up properly. But most expensive? Surviving the backlash and legal
consequences of losing customer data, financial records and private company
information.
http://cwflyris.computerworld.com/t/5022900/283856143/190738/0/
Twitter Tips: Three Ways To Deal With Twitter Spam
As the amount of followers you have on Twitter increases, you might find
yourself dealing with an increase in Twitter spam. Twitter spam derives from
people who take advantage of you following them by sending you unwanted direct
messages or merely by following you with the express intent of upping their
follower count (meaning, they have no sincere interest in your tweets).
http://cwflyris.computerworld.com/t/5022900/283856143/190739/0/
***************SPONSOR**************************************
Best Practices for Backing Up VMware® with Veritas NetBackup™
VMware® is used by enterprises large and small to increase the efficiency and
cost-effectiveness of their IT operations. With this in mind, Symantec has
engineered innovative, award-winning data protection solutions designed
specifically for VMware environments. Download this white paper and discover
best practices for designing solutions for and protecting VMware virtual
machines.
http://cwflyris.computerworld.com/t/5022900/283856143/189615/0/
************************************************************
SHARK BAIT OF THE DAY
_____________________
Explain to me again what DNS is for
The company where I work has been moving our databases from SQL Server 2000 to
SQL Server 2005. As the date for implementation draws near, the programmers are
told they will need to locate all connection strings in all programs and change
them over the weekend to point to the new server ...
http://cwflyris.computerworld.com/t/5022900/283856143/190605/0/
SEEKING THE VERY BEST IT LEADERS
________________________________
Now's your chance to nominate a worthy CIO or other top IT executive for a
Premier 100 IT Leader award. Computerworld has launched its annual search for
technology professionals who have demonstrated leadership through the use of IT
and have the strategic vision to align technology with business goals. Nominate
an IT Leader today! Nominations are open through June 1 at
http://cwflyris.computerworld.com/t/5022900/283856143/183552/0/
(Send questions to premier100@computerworld.com.)
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwflyris.computerworld.com/t/5022900/283856143/156832/0/
COMPUTERWORLD ON TWITTER
________________________
Are you a Twit? So are we! Follow the Computerworld editors at Twitter to hear
what's coming, what's breaking, what's hot, what's not. Plus: Talk back to us
via @computerworld
http://cwflyris.computerworld.com/t/5022900/283856143/126780/0/
___________CONTACTS/SUBSCRIPTIONS___________________________
FEEDBACK
--------
To submit feedback about Computerworld's e-mails, contact our
online customer service group at online@computerworld.com.
Please include your subscriber e-mail address in all
correspondence: austinames2008.pcmag@blogger.com
ADVERTISING
-----------
For information on advertising, contact
Sean_Weglage@computerworld.com.
PRIVACY POLICY
--------------
Computerworld's online privacy policy is at:
http://cwflyris.computerworld.com/t/5022900/283856143/72509/0/
SUBSCRIPTION SERVICES
---------------------
You are currently subscribed to computerworld_security as: austinames2008.pcmag@blogger.com.
To change your e-mail address or subscription preferences, go to:
http://cwflyris.computerworld.com/t/5022900/283856143/72510/0/
To unsubscribe from this newsletter, go to:
http://cwflyris.computerworld.com/t/5022900/283856143/131135/0/?90482085=aHR0cDovL2N3Zmx5cmlzLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9MjgzODU2MTQzLjkxNTdjODA3NmYzMDhkM2VmNzI4ODkwMTQwZWI4ZjI0Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz01MDIyOTAw&x=a5de408e
If the above URL is not enabled as a link, please copy it in to your
browser window to access our Subscription Page.
Did you know Computerworld has 46 other e-mail newsletters that may be
of use to you? go to the following URL to find out more...
http://cwflyris.computerworld.com/t/5022900/283856143/72511/0/
Copyright 2009
Computerworld Inc.
1 Speen Street
Framingham MA 01701
No comments:
Post a Comment