| INSIDER Alert | Your guide to the top content posted this week for Insider members | | Computerworld The IT profession in many ways seems like a good fit for women, but the industry has a hard time attracting them and keeping those who do enter IT. (Insider; registration required) | Computerworld Do you have a domain with email that you want to move over to Gmail and Google Apps? I've got help. I recently made the move myself. Here's how to move the domain and email, complete with "gotchas" you should watch out for, based on my hands-on experience. READ MORE | Computerworld Get the August edition of Computerworld's all-new digital magazine, featuring the challenges CIOs face when they decide to rely on analytics, not instinct, to make decisions. READ MORE | InfoWorld Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information, but the variety of platforms, the fact many are employee-owned, and uneven security capabilities mean it's a real challenge sometimes an impossible challenge to manage them in the same way as the corporate PC. READ MORE | CSO Earlier in the week I shared my experience, which is probably (or at least hopefully) like most, with having credit card information stolen. Since that time, there’s been a nice article written with some common sense ways for folks like us to proactively protect ourselves rather than relying on the measures financial institutions have in place (which are important as well): 1) Monitor Your Bank Statements, At Least Monthly2) Use Your Credit Card, Not Your Debit Card3) Get Free Credit Monitoring4) Bank Smarter (set up account alerts, never use the same password for less secure sites, use paper checks, etc.)5) Don’t Depend on Companies to Inform You of a Breach It’s mostly common sense, but not to be overlooked. Not sure about sure paper check part is necessary, but maybe I am just lazy). If you have other recommendations, please comment on this post.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | CSO Long, complex passwords that must be input on tiny screens, often while on the move: Such hassles make password-based security unworkable in a mobile world. But change is coming, thanks to an industrywide backlash that gave rise to a gold rush of new technologies. Eventually mobile security may no longer hinge on whether a password is long enough, but on how well the device knows the user. "There's been an explosion in the past year, with new things coming out every month," says Kayvan Alikhani, director of technology at RSA, the security division of EMC.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | Network World If you are trying to improve global access to your applications, you have probably considered one of several solutions: stringing together your own private network, purchasing WAN optimization appliances, or using a managed cloud-based service provider. Figuring out the benefits of each solution isn’t easy and it is hard to test for variations in Internet connectivity, specific applications and other conditions.But what if a vendor could show you exactly the benefit in a particular use case, so you could understand what they are delivering? That was the idea behind a request that we made of two vendors in the managed cloud space, Aryaka and Virtela. The former responded to our inquiry with a series of tests; Virtela declined to participate.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | Network World Ever since 2010, when Cisco predicted huge amounts of video traffic on worldwide networks, IT managers have been cautiously watching for it to occur. Cisco’s most current prediction is that 73% of all Internet traffic will be video by 2017. Whether we’ll reach that level remains to be seen, but we have observed significant increases and it is reasonable to assume that much of that traffic will creep into enterprise networks. Also, the amount of such traffic is likely to be higher than IT managers suspect because most monitoring tools only recognize certain forms of video. Since IT managers are likely looking for tools to manage video traffic, we decided to see what products are available and analyze where additional needs exist.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | CSO In today's threatscape, antivirus software provides little piece of mind, and antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. Despite modern heuristics, virtualized environments, system monitoring, and network traffic detection, hackers still reach us on a regular basis. With compromise all but ensured, you need to know the signs of a hacked system, whether by a run-of-the-mill virus or an insiduous advanced persistent threat. InfoWorld's Roger A. Grimes points out the signs both obvious and subtle of an attack on your system and offers remedies for your network. In this downloadable PDF, you'll learn about:To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | | | | |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.