Search This Blog

Thursday, July 09, 2009

AMiloration of security: Milo and future hacking

Online attack hits US government Web sites; The cost of not reaching IT project closure
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by ArcSight
rule

Successfully Detecting Network Threats
Better understand your business and security risks by continuously knowing who is on your network, what data they are seeing, and which actions they are taking with that data. Get the real-time activity correlation and analysis and network threat detection you need.

rule

Spotlight Story
AMiloration of security: Milo and future hacking

Every year, the Master of Science in Information Assurance (MSIA) program at Norwich University hosts the annual three-day Graduate Security Conference for our graduating classes. We always have a plenary session with a distinguished keynote speaker; this year we were honored to welcome well-known antimalware researcher Dr. Richard Ford, Research Professor at the Center for Information Assurance of the Florida Institute of Technology. Dr. Ford spoke about unintended consequences in security in a riveting and highly stimulating presentation which, at my request, included no PowerPoint slides. Read full story

Related News:

Online attack hits US government Web sites
A botnet comprised of about 50,000 infected computers has been waging a war against U.S. government Web sites and causing headaches for businesses in the U.S. and South Korea.

The cost of not reaching IT project closure
All things, good and bad, eventually come to an end. Philosophers have told us this in many variations for at least three or four thousand years. In IT we seem to have exquisitely intricate plans for starting new things: projects, applications, users, policies. Yet we seem to always forget to plan for their eventual end: the closure of projects, the removal of applications, the retirement of servers and the departure of users. Why do we find it so hard to achieve closure?

US authorities extradite Indian on hacking charges
An Indian man has pleaded not guilty to charges that he hacked into online brokerage accounts in order to manipulate stock prices.

Newest IE bug could be next Conficker, says researcher
The critical flaw that Microsoft confirmed on Monday -- but has yet to patch -- is a prime candidate for another Conficker-scale attack, a security researcher said.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Rise and fall of Nortel
vSphereFor better or worse, Nortel as we know it is coming to an end. Here's how the telecom giant got to this point.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

Top 10 Tips for Protecting, Securing SMB Data
Statistics show the typical small business will experience a disruptive event lasting more than 24 hours once every three years. Achieve peace of mind and greater efficiency: Download this whitepaper today and quickly discover the Top 10 best practices for securing SMB business data and ensuring quick recovery.
Top 10 Tips for Protecting, Securing SMB Data


 

July 09, 2009

TOP STORIES | MOST DUGG STORIES

  1. The 10 dumbest mistakes network managers make
  2. Rackspace to issue $3.5 million in customer credits
  3. IPhone users harangue Apple over battery life
  4. The tech industry's most baffling buzzwords: A brief guide
  5. Six Windows 7 features admins will actually care about
  6. Internet's biggest issue? IPv6 transition, new ARIN CEO says
  7. Deathmatch: Palm Pre vs. iPhone
  8. Microsoft confirms attacks against IE6, IE7
  9. Apple to add micro projectors to upcoming iPhone, iPod Touch
  10. The sudden departure of Cisco data center marketing honcho

Lower Costs and Security Risks with the Right Strategy.
Take a multipronged approach to security to successfully protect your corporate assets. Enterprise networks are more distributed which requires IT professionals to pull together a variety of tools to ensure all perimeters are protected. Discover how to minimize risk while keeping costs in check.
Learn more today.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: