Search This Blog

Friday, September 27, 2013

Ctrl+Alt+Del 'was a mistake' admits Bill Gates who also said 'no' about returning as CEO

FTC for first time spanks illegal text messenger with $1M fine | Obama Administration-led data-classification overhaul to bring benefits, costs, disruption

Network World Security

Forward this to a Friend >>>


Ctrl+Alt+Del 'was a mistake' admits Bill Gates who also said 'no' about returning as CEO
At a Harvard fundraising campaign, Harvard Campaign co-chair David Rubenstein, asked Bill Gates, "Why, when I want to turn on my software and computer, do I need to have three fingers on Ctrl+Alt+Delete? What is that -- where does that come from? Whose idea was that?" Read More


RESOURCE COMPLIMENTS OF: SolarWinds

Log Collection, Analysis, and Real-Time Event Correlation
SolarWinds Log & Event Manager (LEM) combines automatic log collection with real-time event correlation and a groundbreaking approach to IT search to deliver the visibility, security, and control you need to stay ahead of threats and overcome everyday IT challenges. SIEM software has never been easier to use or more affordable. Learn more and download a free 30-day trial today!

RESOURCE COMPLIMENTS OF: DameWare®, part of the SolarWinds® Family

DameWare® Remote Support Software – Easy, Fast & Affordable
Remotely manage servers, desktops and laptops in minutes! With DameWare you can remotely manage key elements of your infrastructure - domains, workstations, disk drives, & event logs. You need to resolve Windows, Mac & Linux problems for your end-users quickly, and DameWare lets you perform various critical system management tasks – remotely! Download a fully functional, free trial today and discover in minutes why thousands of system administrators use DameWare every day!

FTC for first time spanks illegal text messenger with $1M fine
The Federal Trade Commission this week said it levied a $1 million fine on California-based debt collector who used text messages to falsely collect debts. Read More

Obama Administration-led data-classification overhaul to bring benefits, costs, disruption
The Obama Administration's push to overhaul how the feds share sensitive -- but not "classified" -- information is expected to come to fruition next year as a major regulatory change with huge consequences to federal agencies and their contractors. Read More

Malicious browser extensions pose a serious threat and defenses are lacking
Although the number of malicious browser extensions has significantly increased in the past year many security products fail to offer adequate protection against them, while others are simply not designed to do so, according to a security researcher. Read More


WHITE PAPER: AppNeta

AppNeta Trace View - Free Trial Download
Want to try AppNeta in your own application environment? Install in 5 minutes! Learn More

A trustworthy cloud guarantees data privacy and chain of custody
Trust, applied to the cloud, means that, even though organizations no longer have physical custody of their files, by embedding security into the document itself they have the means to secure sensitive documents so that they can be shared and still remain private. Read More

‪Debunking four mobile security myths‬‬‬‬‬‬‬
Even with the rapid adoption of mobile in the enterprise, there are a lot of misconceptions about user privacy, security and compliance. We debunk the most prevalent mobile security myths. Read More

'Viceroi' algorithm improves detection of click fraud
A group of researchers have devised an algorithm they say could help advertising networks better detect fraudulent clicks. Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Vendor to IT: You're blocking the wrong services
IT departments have only a loose handle on what types of cloud-based services are being used within their organizations, and many services are being used without the IT department's blessing. Meanwhile, in an attempt to curb this behavior, IT departments commonly block popular cloud-based services, but allow potentially more high-risk services to be used unfiltered. Read More

New US bill aims to curb NSA collection of phone and other records
A bipartisan group of four U.S. lawmakers has introduced legislation that will prohibit bulk collection of phone records of Americans. Read More

7 service requests that make IT support folks cry
Every day, in organizations around the globe, the IT team supports requests that range from common usage requirements to the downright bizarre. When you work in IT, you move from one fire, to putting out to the next. But sometimes, those requests and emergencies just make one want to scream. CSO reached out to a few sources for stories about support incidents that made security managers and IT folks cry. Read More

Quick look: The interesting rise and quick fall of Blackberry
From industry darling to potential footnote, what happened to Blackberry? Read More

Ten tech titans and their temper tantrums
Just because you're an innovative tech industry heavyweight doesn't mean you can't throw a good fit when you don't get your way Read More


SLIDESHOWS

9 free personal clouds

Personal cloud services allow users to store data, share it among devices and collaborate with teams.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Judge orders patent troll to explain its 'Mr. Sham' to jury

2. Wozniak expounds on his hacking shenanigans and online mischief

3. 7 service requests that make IT support folks cry

4. iOS 7 tips and tricks you need to learn

5. Cisco reveals its Internet of Everything router

6. 15 iPhone apps millennials can't live without

7. Vendor to IT: You're blocking the wrong services

8. Ubuntu impresses in Linux enterprise server test

9. We are all a bunch of bigoted jerks ... about technology

10. Strip club sues Oracle over unpaid $33,540 tab


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: