RefBan

Referral Banners

Thursday, April 7, 2011

11 Security Apps to Protect Your Smartphone; Epsilon Data Breach Highlights Cloud Security Concerns

Don't miss a single issue of eWEEK.com Securing the Enterprise. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Securing the Enterprise Securing the Enterprise
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Security | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - April 7, 2011
11 Security Apps to Protect Your Smartphone
Epsilon Data Breach Highlights Cloud Security Concerns
Attack Toolkits, Web Plug-ins Top Cyber-Weapons in 2010
Conde Nast's $8M Spear Phishing Cautionary Tale
Targeted Threats, Mobile Attacks Increased in 2010: Symantec
SPOTLIGHT
Great Google April Fools' Gags
To celebrate the rich history of Google's jokester ways, we take a look back at some of the search engine's better pranks.
READ MORE >>
BEST OF eWEEK
iPad 2 Raises the Bar on Competitors
Why AT&T, T-Mobile Deal Is Bad News
Verizon Unveils HTC Thunderbolt 4G
Addressing Looming Urban EV Problem
FEATURED VIDEO
Managing Mobile with VDI
We look at how to employ network management strategies in a mobile world.
WATCH NOW >>
MOST READ STORIES
Why Windows 8 Will Shatter Windows 7
Features We Expect to See in iPhone 5
'March Madness' of Data Breaches
Developer Draws at Microsoft MIX11
IN THIS ISSUE
11 Security Apps to Protect Your Smartphone
With the recent rash of malware targeting mobile devices and with corporate data increasingly being stored on mobile devices, smartphone security has become critical. That has led to a growth of security products that offer remote find, block and wipe capabilities. Many of them also prevent thieves from swapping the SIM card out of the devices. We take a look at some mobile security apps across all the major platforms.
READ MORE >>

Epsilon Data Breach Highlights Cloud Security Concerns
The theft of email addresses from Epsilon could affect consumer trust, and organizations have to reassess the risks of outsourcing less sensitive data and processes.
READ MORE >>

Sponsored by Hewlett-Packard

The Best Social Network for Your Company
Cameron Sturdevant, technical director eWeek Labs, explains how to pick the right social network for your company.
Watch the Video!
ADVERTISEMENT
Attack Toolkits, Web Plug-ins Top Cyber-Weapons in 2010
Cyber-attackers shifted away from traditional methods to Web-based attacks in 2010 thanks to the proliferation of Web-based plug-ins and attack toolkits, according to a new security report compiled by Hewlett-Packard.
READ MORE >>

Conde Nast's $8M Spear Phishing Cautionary Tale
A scammer managed to spear phish media giant Conde Nast and walk off with $8 million after he posed as a legitimate business. The incident is a timely reminder of how easy it is to fall for a scam.
READ MORE >>

Targeted Threats, Mobile Attacks Increased in 2010: Symantec
Symantec detected more than 286 million malware threats last year. In its annual Internet Security Threat Report, the company found that threats are more sophisticated and targeted.
READ MORE >>

Featured White Papers
Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>

How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>


Featured Webcasts
Channel Insider Alert: Managed Services: Where to Begin?
Apr 14, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes)
Join the Channel Insider for this interactive eSeminar where industry experts will examine these questions and many more. Experts will discuss how to begin changing your business model around to focus on high value and high customer interaction.
REGISTER >>

Smart Ways to Incorporate Social Networking Into Your Enterprise
Apr 13, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes)
Join this free eSeminar to hear from industry leaders CDW and NetApp about the latest techniques for reducing the impact of data growth on your infrastructure.
REGISTER >>


Sign up for complimentary subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360° view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Securing the Enterprise newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Securing the Enterprise, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: