Computerworld Security
May 15, 2009
___________________________________________________________
***************SPONSOR**************************************
Why Email Must Operate 24/7 and How to Make This Happen
Learn how to avoid an email outage by implementing a hosted email continuity
solution.
http://cwflyris.computerworld.com/t/5036446/283856143/189532/0/
************************************************************
In this issue:
1. Patch Adobe's PDF bug pronto, expert urges
2. News Analysis: Courts grapple with law enforcement's use of GPS tracking
3. Microsoft NAP: NAC for the rest of us?
4. Botnet War: The Story So Far
5. Steven J. Vaughan-Nichols: After Googlefail, will you trust online apps?
6. IT Blogwatch: Google outage outrage over #GoogleFAIL
7. Steps for Achieving Proper Mobile Security Governance
OTHER RESOURCES
_______________
Bringing Order and Security to your Mobile Workforce
http://cwflyris.computerworld.com/t/5036446/283856143/180599/0/
The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164
http://cwflyris.computerworld.com/t/5036446/283856143/187181/0/
How to Optimize Your Capture Workflow
http://cwflyris.computerworld.com/t/5036446/283856143/187240/0/
_______________
Patch Adobe's PDF bug pronto, expert urges
Although Microsoft's PowerPoint patch received lots of attention Tuesday,
Adobe's patch for a zero-day flaw in its popular Adobe Reader software update
should be at the top of people's to-do list, a security expert said today.
http://cwflyris.computerworld.com/t/5036446/283856143/191055/0/
News Analysis: Courts grapple with law enforcement's use of GPS tracking
Two recent court decisions highlight the continuing struggles that courts around
the country are having over law enforcement's use of GPS devices to track an
individual's movements.
http://cwflyris.computerworld.com/t/5036446/283856143/191056/0/
Microsoft NAP: NAC for the rest of us?
Microsoft NAP is an effective network gatekeeper for Windows endpoints, but
initial configuration is complex, policies are basic, and reporting is absent.
NAP is best used as a core technology deployed in combination with others for a
more complete, manageable, and scalable solution.
http://cwflyris.computerworld.com/t/5036446/283856143/191057/0/
Botnet War: The Story So Far
What a Botnet Looks Like
http://cwflyris.computerworld.com/t/5036446/283856143/191058/0/
***************SPONSOR**************************************
Key business drivers for Unified Communications
Unified Communications (UC) aims to unite securely and seamlessly all the
different business communications channels that exist in a company. The main
purpose is that UC allows employees to communicate or collaborate more quickly
and easily and, by extension, become more productive. This report examines in
detail the key industry drivers and benefits that are inspiring large scale
enterprises to adopt a Unified Communications strategy.
http://cwflyris.computerworld.com/t/5036446/283856143/189556/0/?3e076d18=YXVzdGluYW1lczIwMDgucGNtYWdAYmxvZ2dlci5jb20%3d&x=a5ada141
************************************************************
Steven J. Vaughan-Nichols: After Googlefail, will you trust online apps?
Google fouled up its own network, so would you trust them, or anyone else, with
your applications.
http://cwflyris.computerworld.com/t/5036446/283856143/191059/0/
IT Blogwatch: Google outage outrage over #GoogleFAIL
It's IT Blogwatch, and Google disappeared for some users for a while yesterday.
Cue widespread wailing and gnashing of teeth.
Yesterday, la GOOG messed up its network routing, causing a bit of an outage.
Richi Jennings watches bloggers blame hackers, AT&T, and even Cthulhu. Not
to mention Star Wars meets MacGuyver, Airwolf, Dallas...
http://cwflyris.computerworld.com/t/5036446/283856143/191060/0/
Steps for Achieving Proper Mobile Security Governance
Advanced mobile devices--iPhone, BlackBerry and other handhelds--have created a
growing wireless mobility environment for business, personal communication and
entertainment. However, their growing use has also led to a faster increase in
the depth and breadth of mobile security threats. Using a mobile device to
access corporate information systems can potentially create a hole to corporate
security if not protected and used properly. In a recent report from CSI, the
theft or loss of corporate proprietary and customer information by mobile
devices is nearly half of all sources. Data breaches are real to nearly every
organization of virtually any size, from the big multinational corporation to
the small to medium business, including device loss, theft, misuse, and
unauthorized access to corporate network and data disclosure.
http://cwflyris.computerworld.com/t/5036446/283856143/191061/0/
***************SPONSOR**************************************
Why SharePoint Needs Riverbed WAN Optimization
Many SharePoint implementations are mission critical, yet access to these sites
is often thwarted by poor network performance. In this analyst report from ESG,
you'll discover how, much like Microsoft Exchange and other collaboration
applications, companies deploying SharePoint can benefit from WAN optimization
solutions, ensuring that they make the most of its productivity and information
sharing capabilities.
http://cwflyris.computerworld.com/t/5036446/283856143/189546/0/
************************************************************
SHARK BAIT OF THE DAY
_____________________
Error messages
I got an e-mail asking me for help with a program that crashed almost every time
it was run. In the e-mail, the user, supplied me with all the information
necessary: computer name, other programs running, and error message, almost 100%
verbatim. One letter was mistyped, a very small typo -- but it became one of the
most honest descriptions I ever read of an error ...
http://cwflyris.computerworld.com/t/5036446/283856143/190895/0/
SEEKING THE VERY BEST IT LEADERS
________________________________
Now's your chance to nominate a worthy CIO or other top IT executive for a
Premier 100 IT Leader award. Computerworld has launched its annual search for
technology professionals who have demonstrated leadership through the use of IT
and have the strategic vision to align technology with business goals. Nominate
an IT Leader today! Nominations are open through June 1 at
http://cwflyris.computerworld.com/t/5036446/283856143/183552/0/
(Send questions to premier100@computerworld.com.)
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwflyris.computerworld.com/t/5036446/283856143/156832/0/
COMPUTERWORLD ON TWITTER
________________________
Are you a Twit? So are we! Follow the Computerworld editors at Twitter to hear
what's coming, what's breaking, what's hot, what's not. Plus: Talk back to us
via @computerworld
http://cwflyris.computerworld.com/t/5036446/283856143/126780/0/
___________CONTACTS/SUBSCRIPTIONS___________________________
FEEDBACK
--------
To submit feedback about Computerworld's e-mails, contact our
online customer service group at online@computerworld.com.
Please include your subscriber e-mail address in all
correspondence: austinames2008.pcmag@blogger.com
ADVERTISING
-----------
For information on advertising, contact
Sean_Weglage@computerworld.com.
PRIVACY POLICY
--------------
Computerworld's online privacy policy is at:
http://cwflyris.computerworld.com/t/5036446/283856143/72509/0/
SUBSCRIPTION SERVICES
---------------------
You are currently subscribed to computerworld_security as: austinames2008.pcmag@blogger.com.
To change your e-mail address or subscription preferences, go to:
http://cwflyris.computerworld.com/t/5036446/283856143/72510/0/
To unsubscribe from this newsletter, go to:
http://cwflyris.computerworld.com/t/5036446/283856143/131135/0/?90482085=aHR0cDovL2N3Zmx5cmlzLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9MjgzODU2MTQzLjkxNTdjODA3NmYzMDhkM2VmNzI4ODkwMTQwZWI4ZjI0Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz01MDM2NDQ2&x=684f45fd
If the above URL is not enabled as a link, please copy it in to your
browser window to access our Subscription Page.
Did you know Computerworld has 46 other e-mail newsletters that may be
of use to you? go to the following URL to find out more...
http://cwflyris.computerworld.com/t/5036446/283856143/72511/0/
Copyright 2009
Computerworld Inc.
1 Speen Street
Framingham MA 01701
No comments:
Post a Comment