Search This Blog

Thursday, April 02, 2009

3 Free, Easy Ways To Protect Your Network; Cyber espionage from state governments?

GhostNet at heart of international cyber espionage search
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by RSA Security
rule

Security Operations 2.0: What does this mean for you?
Forrester and RSA On- Demand Webcast: Webcast reviews the following topics: Why are more and more companies putting a greater emphasis on building a security operations center or function? What should your top priorities be to build the most effective security operations? How can the latest release of RSA enVision (R) platform help you use security to meet your ongoing business objective To listen to the replay

rule

Spotlight Story
3 Free, Easy Ways To Protect Your Network

By Zack Stern
Whether the Conficker worm booms or fizzles, take it as a reminder to keep your networks safe. You could spend money on a security consultant--which isn't such a bad investment if helpful--but here are three free tricks to increase your network's security. Read full story

Related News:

Cyber espionage from state governments? Don't be surprised The report "Tracking GhostNet: Investigating a Cyber Espionage Network," a collaborative effort by consultancy SecDev Group and the Munk Centre for International Studies at...

Group takes Conficker fight to a new level Forming a global alliance to fight cybercrime isn't easy, and building an organization that can stay one step ahead of cyber crooks in more than 100 countries is close to impossible. But a band of volunteers calling itself Conficker Working Group thinks it can do it.

Conficker Worm: Has the Hype Been Worth It? Cisco Subnet welcomes new guest blogger, security expert Andrew Whitaker. Whitaker notes that the Conficker worm seems not to have been the big, bad threat that so scared the industry.

Conficker & Our "Cold War" View of Malware Microsoft blogger Mitchell Ashley wonders why and how Conficker spread so successfully. Conficker's two biggest threats are its phone home for instructions feature, and how effectively it has spread.

Vendors Deserve Some Credit for Conficker Response I planned to make this a column about how the security vendors and PR flaks blew things way out of proportion with Conficker. I was ready to take them to task for predicting an Internet meltdown at the hands of what is no doubt the most prolific piece of malware we've seen in some time.

Conficker's makers lose big, expert says The malware makers who crafted Conficker must be extremely disappointed, a security expert said Wednesday, and not because the Internet didn't come crashing down as some of the wildest speculation had predicted.

PCI security standard gets flayed at House hearing The PCI standard, long touted as one of the private sector's best attempts to regulate itself on data security, is increasingly showing signs of coming apart at the seams.

Legislation would create new cybersecurity regulations Two U.S. senators have introduced legislation that would overhaul the nation's cybersecurity efforts, and would reportedly allow the government to regulate some private company cybersecurity efforts for the first time.

Federalizing Cybersecurity: Necessary or Nitwitted? The U.S. Government has had a lot of trouble getting its IT security house in order. Hackers from China and elsewhere keep breaking into government networks to conduct espionage. Federal cybersecurity directors keep quitting.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by RSA Security
rule

Security Operations 2.0: What does this mean for you?
Forrester and RSA On- Demand Webcast: Webcast reviews the following topics: Why are more and more companies putting a greater emphasis on building a security operations center or function? What should your top priorities be to build the most effective security operations? How can the latest release of RSA enVision (R) platform help you use security to meet your ongoing business objective To listen to the replay

rule

Create Your Own Agenda at IT Roadmap
Customize a day of learning just for yourself! Attend IT Roadmap Conference & Expo and explore new solutions and examine new technology across 10 relevant areas of IT. Security, Virtualization, SaaS, VoIP, Green IT and more. 10 U.S. cities in '09. Next up.. NYC-Feb, Denver-March, Chicago-April.
Select your city, register and attend free!


Complimentary DNS newsletter
Sign-up today and receive the latest DNS news and analysis. This newsletter provides deep insight into this murky area and offers ways to understand and mitigate risk with better management and control of your domain, email and DNS.
Sign up now

 

04/02/09

Today's most-read stories:

  1. Conficker activation passes quietly, but threat isn't over
  2. Some UltraDNS customers knocked offline by attack
  3. 15 foolish high-tech stories
  4. Five best router and switch features you never use
  5. Mobile Skype: The end of cellular as we know it
  6. Top 10 technology skills
  7. Fools and jokers coming to a network near you
  8. How do you manage IP addresses?
  9. CEO payday: How much tech chiefs made in '08
  10. Telstra will split for NBN
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: