Search This Blog

Thursday, August 20, 2009

Windows WINS attacks coming from China; Managed security services all the rage

Windows WINS attacks coming from China; Managed security services all the rage
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by Akamai
rule

Application Performance Solution Center
Review this site on managed application delivery services for your Enterprise. Peruse these whitepapers, and other offers to get up to date on your WAN needs.

Learn more

rule

Spotlight Story
IA policies (part 1)

How do we resolve the issue of acknowledging (to ourselves) that some of our information assurance (IA) policies cannot, or should not, be strictly enforced, while at the same time conveying to staff the importance of always following IA policies? Read full story

Related News:

Windows WINS attacks coming from China
Yesterday, John Fontana reported that the vulnerability in the WINS service on Windows server was being exploited, and now researchers have found that the attacks are coming from China, despite some troubles with the undersea cables linking China to other parts of the world.

Managed security services all the rage
It's an understatement to say that IT organizations face exceptionally challenging times. For many, budget cutbacks for 2009 were worse than predicted.

Motorola boosts wireless network security
Motorola Tuesday said it is adding vulnerability assessment to its wireless intrusion-prevention system (IPS) device so that organizations can scan for security holes in Wi-Fi and wireline networks.

Managed security services all the rage
It's an understatement to say that IT organizations face exceptionally challenging times. For many, budget cutbacks for 2009 were worse than predicted.

Alleged data breach kingpin had plenty of help
Albert Gonzalez, whom federal prosecutors are calling the mastermind behind the largest ever data breaches in U.S history, had plenty of help in pulling off his spectacular heists.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

IDC: Realizing the Benefits of Deduplication
Many organizations are grappling with rapidly growing storage requirements. IDC has found that those organizations are experiencing 50% growth in data, adding as much as 4TB of data each year. Read this whitepaper on dynamic deduplication to understand cost effective solutions to exploding storage.
Learn more


Gaining the Performance Edge Using a Column-Oriented Database Management System
Many organizations are increasingly recognizing the potential benefits of how analytic databases can support reporting, strategic analysis, and other business intelligence activities. Explore the data explosion phenomenon and why column-oriented database systems are able to provide the boost that is needed to gain the performance edge.
Learn More

 

August 20, 2009

TOP STORIES | MOST DUGG STORIES

  1. How to build a 100,000-port Ethernet switch
  2. Windows 7 RC downloads end Thursday
  3. The 10 stupidest tech company blunders
  4. Apple disasters
  5. Account password reset procedures a joke
  6. Windows WINS attacks in the wild
  7. When Apple flops: The worst products of all time
  8. DNS 'blacklist' unveiled
  9. Port 666
  10. FAQ: How to get Windows 7 on the cheap

Controlling Access to Privileged Accounts
This white paper explores insider attacks and insider risk, and shows how to control them by controlling and monitoring access. The paper describes the more common vulnerabilities exploited by insider attacks and a method for assessing insider risk.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: