Search This Blog

Wednesday, July 01, 2009

Cybersecurity boondoggle?

Unisys targets secure cloud computing; 'Swatting' case shows need to ban caller-ID spoofing
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Tripwire
rule

Meeting PCI and Securing the Data Center
Discover the risks improperly implementing PCI DSS configuration controls and change processes present to the cardholding environment and how configuration assessment and file integrity monitoring can mitigate them.

rule

Spotlight Story
Cybersecurity boondoggle?

Read full story

Related News:

Unisys targets secure cloud computing
Unisys is announcing Tuesday a new set of services in the area of secure cloud computing aimed at addressing customers' security concerns about moving their applications and data to an external cloud.

'Swatting' case shows need to ban caller-ID spoofing
What Matthew Weigman and his cohorts did went so far beyond "pranks" -- or even hacking -- as to leave little room to question the sentence he received yesterday. From an IDG News Service story on our site:

Government criticised for plan to hire 'naughty boys'
The security minister Lord West has been slammed for hinting that former hackers are being recruited by Britain's security forces to help protect IT infrastructure from malicious online forces.

Hacking Exposed author reveals his security secrets
Just what motivates the bad-guys to hack into a computer or network infrastructure? According to Stuart McClure, vice-president of operations, strategy for McAfee Inc.'s risk and compliance business unit, and one of the authors of the book Hacking Exposed: Network Security Secrets & Solutions, malicious intent, combined with design flaws, misused functionality and poor common sense are what cause these attacks to happen.

Obama's Cybersecurity Push: What It Means for CIOs
Happy Birthday, America. We're not as safe as we think. From the electricity grid to the banking system to the defense contractors building our most sophisticated weapons, computers running the nation's critical infrastructure see relentless attacks from criminals and countries alike. Sometimes we hear about it, sometimes we don't.

June Giveaways
Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.

Network World on Twitter? You bet we are


Rise and fall of Nortel
vSphereFor better or worse, Nortel as we know it is coming to an end. Here's how the telecom giant got to this point.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

Polling Results: Leading IT Pros Weigh In on Top IT Issues
Accelerate your knowledge of the IT world you inhabit by viewing the results of a series of polls taken by your IT peers. These polls of 100+ IT professionals each are available for full viewing. They cover key topics such as virtualization, processor performance, green IT, cloud computing and many others.
Polling Results: Leading IT Pros Weigh In on Top IT Issues


 

July 01, 2009

TOP STORIES | MOST DUGG STORIES

  1. Cisco announces highest certification
  2. Worst U.S. cities to work in IT
  3. Windows 7 in Pictures: 10 Cool Desktop Features
  4. Cisco sends employees home to work
  5. Broadband stimulus exempted from "Buy American"
  6. Blind phone hacker gets 11-year sentence
  7. 'Swatting' case shows need to ban caller-ID spoofing
  8. Fake Microsoft Update email scam
  9. IT salaries, perks continue to shrink
  10. Nortel: Why Avaya?

Successfully Detecting Network Threats
Better understand your business and security risks by continuously knowing who is on your network, what data they are seeing, and which actions they are taking with that data. Get the real-time activity correlation and analysis and network threat detection you need.
Successfully Detecting Network Threats



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: