Search This Blog

Friday, March 13, 2009

Best security questions to ask about SaaS; Conficker.C variant set for April 1st surprise

Burton analyst warns about software-as-a-service security pitfalls
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Mobility Security Worksheet
This tool enables you to compare your views to those of your peers. Simply check off areas of importance to you and provide your benefit estimates. Your views will then be compared to your peers to offer comparative estimates of the security impact of mobile computing.

rule

Spotlight Story
Best security questions to ask about SaaS

Ellen Messmer By Ellen Messmer
Security issues have to be clearly examined before diving into software as a service (SaaS), warns Burton Group analyst Eric Maiwald, who shed some light on the subject at this week's Infosec conference. Read full story

Related News:

Conficker.C variant set for April 1st surprise, CA says The third Conficker variant is set to activate April 1, says CA, generating 50,000 URLs daily with its download function poised for instructions.

Romanians find cure for conficker BitDefender has released what it claims is the first vaccination tool to remove the notorious Conficker virus that infected some 9 million Windows machines in about three months.

IBM software to ease multivendor security management IBM is introducing software that lets customers manage multivendor desktop security agents via a single console, affording them a broader choice of security products without proliferating management platforms.

D.C.'s CSO allegedly busted by FBI in federal bribery sting Yusuf Acar appears not to have any security certifications or experience, according to documents uncovered by Cisco Sunbet blogger Brad Reese. How the heck did he get hired for the top security role?

Political cyberattacks to militarize the Web Governments looking to silence critics and stymie opposition have added DDOS (distributed denial-of-service) attacks to their censoring methods, according to a security expert speaking at the Source Boston Security Showcase.

Cisco cuckoo for comic strip campaign Looking for someone other than itself to pat its back, Cisco pitched a story on its new comic strip character-based advertising campaign for its security products to no less than four Network World editors this week.

SOA Security: The Basics In this article, we examine how security applies to Service Oriented Architecture (SOA). Before we discuss security for SOA, lets take a step back and examine what SOA is.

New report offers low-down on secure develoment A trio of security activists have come up with what they claim is the first systematic yardstick' developers can use to assess the quality of in-house software security initiatives.

Worldwide cybercrime police network grows More countries are joining a network designed to quickly react to cybercrime incidents around the world, a senior U.S. Federal Bureau of Investigation official said Wednesday.

Former Senator's donor database exposed on Wikileaks In a brewing controversy, whistleblower site Wikileaks.org has published personal information belonging to more than 51,000 donors and supporters of former Minnesota Senator...

Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Dell
rule

Mobility Security Worksheet
This tool enables you to compare your views to those of your peers. Simply check off areas of importance to you and provide your benefit estimates. Your views will then be compared to your peers to offer comparative estimates of the security impact of mobile computing.

rule

Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.

 

03/13/09

Today's most-read stories:

  1. Rumors: Apple Layoffs, 10-inch iPod Touch
  2. H-1B hiring too much of a hassle?
  3. 10 iPhone apps that could get you into trouble
  4. Cisco quietly downsizing through outsourcing
  5. Microsoft, Intel to back Cisco's "Unified Computing" launch
  6. MIT breakthrough promises lighter, fast-charging batteries
  7. 12 changes to give U.S. cybersecurity a kick in the pants
  8. Exchange alternatives: Pros and cons
  9. Nortel looking to break apart
  10. FAQ: What happens to H-1B in down economy?
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: