| Hunting down bots on your network "Bots are really tough to keep track off. Their Achilles heel has always been their bi-directional communication with a command and control server somewhere. I am a big believer in mining and correlating your current data to find answers on your network. With that in mind, I have been running the program Bot Hunter for a while now...a free program for tracking bots on your network that uses the Snort 2 correlation engine," Jimmy Ray Purser writes in his Networking Geek to Geek blog. Cisco releases patch to fix DoS vulnerability in 7600 routers Cisco on Wednesday released a patch that fixes a denial of service (DoS) vulnerability in the Cisco Session Border Controller (SBC) for the Cisco 7600 series routers. In addition to the patch, Cisco has published workarounds that mitigate the problem. All Cisco ACE-based SBC modules running software versions prior to 3.0(2) are affected. However, the Cisco XR 12000 Series SBC is not vulnerable. Job 1 for New Federal CIO: Balance Openness with Security President Barack Obama has repeatedly pledged to make the federal government more open, transparent and accountable to American citizens. After assuming office on January 19, 2009, he immediately took steps to act on his promise, which included issuing new, more open guidelines for the Freedom of Information Act, and more recently, ordering an overhaul of the federal government's contracting system. Security needs to be 'baked in' say experts A panel of security experts agreed that security needs to thought of a lot earlier in the software development lifecycle, and that the IT industry needs to start shipping "hardened" products, especially with the advent of the cloud and visualisation making the location of sensitive data even more difficult to locate. Users gain options for mobile voice encryption U.S. President Barack Obama's dilemma over the security of his BlackBerry has given rise to an increased interested in systems that can scramble voice calls to avoid interception. Take the complexity out of firewall configuration changes As network security infrastructure grows larger and more complex, the likelihood of omissions and misconfigurations that can lead to data breaches and other serious problems is a growing concern. Tufin Technologies has solutions for security lifecycle management that take the human judgment factor out of firewall and router configuration changes. Read about the tools that reduce the risk level that's inherent in security configuration changes. European push for more online rights to privacy Members of the European Parliament (MEPs) will push for a re-think of the balance between the need for security and the right to privacy on the Internet, not just in Europe but around the world, they agreed during a debate at the Parliament on Thursday. Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide. Enter for a Microsoft training giveaway from New Horizons New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment