Other
Commentary
12/28/2006
02:00 PM
Commentary
Commentary
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Google's Holiday Wish May Come True: An Online Clone Of Microsoft Office

In This Issue:
1. Editor's Note: Outsource Security Carefully, And Carry A Big Audit Plan
2. Today's Top Story
    - Google's Holiday Wish May Come True: An Online Clone Of Microsoft Office
Related Stories:
    - Google Lets Business Customers Register Domains
    - Major Google, Yahoo Stockholder Says Both Companies Need Human Rights Standards
3. Breaking News
    - Outsourcing Security Doesn't Mean You're Desperate
    - Wireless Network Head-to-Head: Cisco Vs. Meru
    - NYC Cabs Getting Text Messaging, Locator Technology, Passenger Screens
    - First Layoffs, Now A Management Exodus At AOL
    - Worm Attacks Symantec Enterprise Anti-Virus
    - Group Pushes Congress For Data Protection; Cites More Than 100
    - Sturdier Botnets Mean More Spam In 2007
    - India Will Become A Force In Semiconductors By 2010
    - Microsoft Patches IE 7 Phishing Filter To Boost Speed
    - GAO Says Electronic Border Control System Is Problem Plagued
    - Amazon Dispute Could Put IBM Software Customers In Legal Jeopardy
    - IBM, Intel Roll Out Virtualization Tools
4. In Depth: Gaming
    - Virtual Property Rights Are No Game
    - Nintendo Offers To Replace Wii Remote Wrist Strap
    - Warner Buys A Piece Of Interactive Game Maker SCi
    - Microsoft, Epic Sell 2 Million 'Gears Of War' Video Games In Six Weeks
5. Voice Of Authority
    - Craigslist Flummoxes Financial Analysts
6. White Papers
    - Supermarket Chain Tracks Real-Estate Data In Real Time
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription

Quote Of The Day:
"Is it safe? Is it safe?" - Evil Nazi Christian Szell (Laurence Olivier) as he prepares to torture college student Babe Levy (Dustin Hoffman) in the movie Marathon Man


1. Editor's Note: Outsource Security Carefully, And Carry A Big Audit Plan

Are IT managers desperate if they outsource security?

That's the provocative question Larry Greenemeier asks in today's issue of InformationWeek. His conclusion? A resolute no. In fact, hiring an independent service provider might just be your best bet for staying safe in the midst of rising threats against malware, hackers, and internal saboteurs.

It's a good question, though. After all, handing over the job of keeping your all-important networks, systems, and data safe can seem like an act of last resort, acknowledging—as Greenemeier points out—that the job is simply too much for you. Yet isn't it better to make such an acknowledgement and seek appropriate help rather than denying evidence that you may be putting your organization at risk?

Still, outsourcing shouldn't be done casually and without stepping exceedingly carefully through the vendor selection process. Greenemeier outlines the minimal actions you must take with this regard.

One thing he doesn't mention, however, which should be at the top of any IT professional's list: active risk management of vendors using independent third-party auditors. And a just-released study by Ernst & Young indicates that IT managers are woefully unprepared when it comes to protecting themselves against incompetent, unskilled, or generally ineffectual third-party security service providers. Only 14% of the 1,200 global IT professionals surveyed have formal security risk management procedures in place that are properly validated by auditors. And let's face it: independent auditing of vendor effectiveness is the single—perhaps the only—way to sleep at night when outsourcing something as important as security.

Indeed, although 60% of the survey participants who had outsourced information security activities already—or who were planning to do so—said they were doing it to focus valuable IT resources on other key areas, most were "overwhelmingly emphatic" about their determination not to outsource security functions because of the risks involved.

What do you think? Have you outsourced all or part of your security activities? Why or why not? Let me know what you think by responding to my blog entry at the InformationWeek Weblog.

Alice LaPlante
Alice.laplante@gmail.com
www.informationweek.com


2. Today's Top Story

Google's Holiday Wish May Come True: An Online Clone Of Microsoft Office
A Google team has visited the Korean company that makes ThinkFree Office, a clone of Microsoft Office, for acquisition talks twice in recent days, according to Korean press reports.

Related Stories:

Google Lets Business Customers Register Domains
Google plans to extend its private-label calendar, e-mail, and IM service to organizations without a registered domain name by helping them to register a domain name.

Major Google, Yahoo Stockholder Says Both Companies Need Human Rights Standards
The New York City Pension Fund, which holds nearly $400 million worth of shares in Google and Yahoo, adopted a resolution saying all U.S. technology companies that operate in authoritarian nations have an obligation to comply with the human rights principles set by the United Nations.


3. Breaking News

Outsourcing Security Doesn't Mean You're Desperate
Handing over security to a service provider just might be the best way to stay safe.

Wireless Network Head-to-Head: Cisco Vs. Meru
Network Computing compared wireless gear from Cisco Systems and Meru Networks in our Real-World Labs. The performance results are valuable, but the real story is whether Meru deviates from the 802.11 standard.

NYC Cabs Getting Text Messaging, Locator Technology, Passenger Screens
All New York City cabs will have information monitors, credit card readers, and satellite maps by next year.

First Layoffs, Now A Management Exodus At AOL
A group of executives who worked closely with recently departed chief executive Jonathan Miller are reportedly planning to leave the company.

Worm Attacks Symantec Enterprise AntiVirus
The malware exploits a critical vulnerability in Symantec AntiVirus and Symantec Client Security, two of the vendor's business security products.

Group Pushes Congress For Data Protection; Cites More Than 100 Million Compromised Personal Records
The Cyber Security Industry Alliance warns that political and economic fallout will continue until lawmakers agree on a uniform federal data protection standard.

Sturdier Botnets Mean More Spam In 2007
If a control server is shut down, the spammer can easily update the rest of the bots with the location of a new server as long as he controls at least one bot in the net.

India Will Become A Force In Semiconductors By 2010
A new report from In-Stat says that an acceleration in electronics manufacturing and growing semiconductor consumption is setting India up to be a major player in that market.

Microsoft Patches IE 7 Phishing Filter To Boost Speed
Microsoft says IE 7 users may see their PCs bog down as the filter evaluates multiframe pages for fraud indicators.

GAO Says Electronic Border Control System Is Problem Plagued
A multibillion dollar system of electronic entry and exit checkpoints at U.S. border crossings is suffering from lax controls and inadequate management oversight, according to a GAO report.

Amazon Dispute Could Put IBM Software Customers In Legal Jeopardy
Amazon's lead attorney in the case says that the Web merchant is, for now at least, not likely interested in pursuing WebSphere users.

IBM, Intel Roll Out Virtualization Tools
Customers can predict the effects of running multiple instances of consolidated database, mail, Web, and Java workloads in multiple, virtual CPU partitions on IBM's Intel-based System x servers before moving into production.

All Our Latest News

----- The latest research, polls, and tools -----

Managing Privacy Issues
Learn how your peers are protecting customer data and managing privacy issues in the InformationWeek/Accenture Global Information Security survey of more than 2,000 technology and security professionals.

Do You Access Our Content From A BlackBerry Or Treo?
Many of our readers do, and we want to ensure that you get the best experience in using our content. So we've created a PDA-friendly version of our news content, with similarly streamlined content pages, that should make the PDA experience a good one. Check out our latest enhancement.

-----------------------------------------


4. In Depth: Gaming

Virtual Property Rights Are No Game
Lawsuit against Second Life owner Linden Lab seeks to clarify ownership of real estate in the virtual world

Nintendo Offers To Replace Wii Remote Wrist Strap
Company provides a stronger strap after reports of minor injuries from flying "Wiimotes."

Warner Buys A Piece Of Interactive Game Maker SCi
Under the agreement, SCi's Eidos Interactive would be able to make and distribute games featuring Warner Bros. characters.

Microsoft, Epic Sell 2 Million 'Gears Of War' Video Games In Six Weeks
The game also was the hottest selling video game in the United States in November.


5. Voice Of Authority

Craigslist Flummoxes Financial Analysts
Mitch Wagner observes that there has been some, er, lively talk revolving around Craigslist executives' contrarian statements at a financial analysts' conference that they don't have any plans to charge for listings (beyond the minimal charges already in place).


6. White Papers

Supermarket Chain Tracks Real-Estate Data In Real Time
Stop & Shop/Giant Foods needed a property-management and lease-administration application that could deliver integrated real-time views of critical data. The firm chose AMTdirect because it integrates data across diverse functional areas and provides extensive management reporting capabilities.


7. Get More Out Of InformationWeek

Try InformationWeek's RSS Feed

Discover all InformationWeek's sites and newsletters

Recommend This Newsletter To A Friend
Do you have friends or colleagues who might enjoy this newsletter? Please forward it to them and point out the subscription page.


8. Manage Your Newsletter Subscription

To unsubscribe from, subscribe to, or change your E-mail address for this newsletter, please visit the InformationWeek Subscription Center.

Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
InfoWeek@update.informationweek.com

If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.

We take your privacy very seriously. Please review our Privacy Policy.

InformationWeek Daily Newsletter
A free service of InformationWeek and the TechWeb Network.
Copyright (c) 2006 CMP Media LLC
600 Community Drive
Manhasset, N.Y. 11030

Comment  | 
Print  | 
More Insights
The Business of Going Digital
The Business of Going Digital
Digital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - August 20, 2014
CIOs need people who know the ins and outs of cloud software stacks and security, and, most of all, can break through cultural resistance.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.