Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cisco Security Report Sees Social Media Risk


Issue Highlights:

InformationWeek Daily Newsletter

TOP STORY: Cisco Security Report Sees Social Media Risk

MORE NEWS: White House Issues Open Government Directive

ANALYTIC REPORT: Securing The Cyber Supply Chain

WHITEPAPER: Lower Your IT Costs and Risks

BLOG: IBM Fellow Says SOA More Relevant Than Ever

WEBCAST: Reducing Operating Costs Through Branch Consolidation

RESOURCES: Financial Services Techs: Ready for 2010?

InformationWeek Daily

 
 Wednesday, December 9, 2009 

INFORMATIONWEEK.COM
  |  
NEWS
  |  
ANALYTIC REPORTS & WHITEPAPERS
  |  
BLOGS
  |  
WEBCASTS
  |  
RESOURCES

 
QUOTE OF THE DAY...
"Computing is not about computers any more. 'It is about living."
-- Nicholas Negroponte 
 


TODAY'S TOP STORY

Cisco Security Report Sees Social Media Risk


Bad passwords, inconsistent patching, excessive information sharing, and outdated AV software are key ingredients in what Cisco calls a security "nightmare formula."

RELATED INSIGHTS

Government Surveillance Of Social Networks Challenged

Global CIO: Fear Of Facebook For The Enterprise

Encryption Is Cloud Computing Security Savior

ALSO SEE

White House Issues Open Government Directive

The Obama administration outlines steps that federal agencies must take to become more open, participatory, and collaborative, including release of "high value" data.

Apple Pulls 1,000 Apps For Ratings Problems

Molinker is accused of falsifying 5-star ratings for its programs to boost its rating in the App Store.

Fujitsu To Offer Cloud Services

The company enters the ranks of cloud competitors, supplying compute infrastructure as a service through its expanded data centers.

Google Releases Chrome For Mac, Linux

Over a year after the release of Google Chrome for Windows, Mac and Linux beta versions have arrived.

Publishers Collaborate On E-Reader Platform

Top magazine publishers will launch a digital storefront and software platform for publishing on e-readers, smartphones, and laptops.

Microsoft Dismisses BitLocker Threat

Software maker claims vulnerability exposed by researchers unlikely to occur in "real world."

EMC Launches Storage Automation

The company says its fully automated storage tiering technology will cut storage acquisition costs by 20% and trim storage operation expenses by 40%.

Sprint Completes iPCS Acquisition

The $831 million deal will end all pending litigation between the companies and expand Sprint's coverage area and number of subscribers.


---------------------------------------------
This issue sponsored by Qwest:
---------------------------------------------
Latest Resources from the Qwest Beyond
Business Connectivity Center:
- Stay Connected: Embrace Mobility
at your Business
- Maximize Productivity with
Efficient Connectivity
- Cutting Costs with Smart
Enterprise Telecom Choices
- 5 Real World Tactics for Avoiding
the Mobile Blind Spot
Click Here!


ANALYTIC REPORTS & WHITEPAPERS

FEATURED REPORTS

Securing The Cyber Supply Chain

Security experts advise government agencies and other organizations to take an end-to-end approach to securing their IT systems, one that includes suppliers and service providers. Read our report to learn how to get started in this emerging area.

Download Now (Registration Required)

Featured Report

10 Steps to Effective Data Classification

Learn how to sort your company's assets based on sensitivity.

Download Now (Registration Required)

Featured Report

MORE ANALYTICS

spacer spacer spacer
FEATURED WHITEPAPERS

Lower Your IT Costs and Risks


The costs of server management, including power and cooling costs, will outpace the costs of buying these servers by a factor of four times and eight times respectively. Find out how a server makeover analysis can help you develop a high-level roadmap for your infrastructure.
Download Now

The Top 5 NAC Challenges, and How to Tackle Them


Mobility and outsourcing present IT with the challenging task of opening the network to a dynamic workforce, while at the same time protecting critical assets from vulnerabilities. Learn what the top 5 NAC challenges are, and how Unified Access Control (UAC) can help.
Download Now

MORE WHITEPAPERS AT

TODAY AT THE BLOG


FEATURED BLOG
Featured BloggerIBM Fellow Says SOA More Relevant Than Ever


Posted by Fritz Nelson

You can't help getting the impression from Kerrie Holley, IBM's CTO of its SOA Center of Excellence, of how much the idea of services remain the underpinning of everything.

ALSO SEE

Mayor Gavin Newsom: Role of Social in Govt (Part 3)

Posted By Fritz Nelson


In the final part of this three-part video interview series with San Francisco Mayor Gavin Newsom, we talked about the role of social networking, not just in winning a political race, but in ongoing government -- in building participation among citizens. He talks about his successes and failures, and what he's learned along the way.

Oracle Set For EU Showdown As Blind Call Ellison Lame

Posted By Bob Evans


As Microsoft and SAP prepare giddily to hammer Oracle in Brussels this week, those two big and dominant global companies damn well better remember that they could be next on the EU rack because the EU's objectives aren't about "fairness"--they're about politics and power. Appeasing the EU now won't grant them sanctuary later--it will only embolden the bureaucrats of Brussels.

Bank Login Stealing Trojan Threat Grows

Posted By George Hulme


Cisco released its Cisco 2009 Annual Security Report this morning, and it contains some interesting insight on many of the vulnerabilities and threat vectors we face today.

Windows 7 Upgrades Drop Ball On Data Migration

Posted By Alexander Wolfe


Today's experience of upgrading one's PC to a new operating system is qualitatively different from that of a decade ago. It's no longer so much about the OS. There's lots more user data--pictures and e-mails--to move over. And that experience, quite frankly, stinks.


WEBCASTS

Reducing Operating Costs Through Branch Consolidation


In this live Webcast, you'll hear how IT organizations are gaining the ability to completely virtualize their branch office operations, achieving a "serverless" state that eliminates redundant hardware and software, while slashing maintenance costs and IT complexity.

It happens December 15, 2009 @ 9:00 AM PT/ 12:00 PM ET

More Information & Registration


----------------------------------------
Special Report from Internet Evolution:
----------------------------------------
Can businesses still make money with the
Internet? Sure, but it's not as easy as
it once was thought to be.
www.internetevolution.com/register


RESOURCES AND EVENTS


Financial Services Techs: Ready for 2010?


After this roller coaster year, what does 2010 have in store for financial services CIOs? Join Wall Street & Technology as they examine the technologies, news, trends and strategies that will shape the financial services industry in the coming year.


Visit Today

Image Gallery of the Week 

Image Gallery: Ubuntu's DIY Cloud Computing Infrastructure


Using the Ubuntu open source platform, it's now possible to set up your elastic computing environment, connect it to Amazon EC2 and migrate it outwards if need be. Here's how.


View It Now

FREE Gizmo from Internet Evolution


Become one of the first 1,000 people to join Internet Evolution's Midmarket Clan, and we'll send you a FREE dual laser pointer/flashlight, perfect for any business exec! Limited time only, while supplies last.


Become A Member Today!

TechWeb Marketplace


InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

UNSUBSCRIBE | SUBSCRIBE


This e-mail was sent to %%email%%


Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing.
Take a moment to add the newsletter's address to your anti-spam white list:
[email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.