Friday, March 26, 2010

50 riskiest cities for cybercrime; 5 ways to beat Great Firewall of China

Five ways to beat the Great Firewall of China | Howard Schmidt: Cybersecurity Battle 'Different'

Network World Compliance

Forward this to a Friend >>>


Is your city a cybercrime center?
Are some cities in the U.S. worse in terms of cybercrime than others? Read More


RESOURCE COMPLIMENTS OF: IBM NWW


Improving the security of web applications starts by building software securely. IBM Rational AppScan is a suite of Web application vulnerability scanners that include dynamic and static analysis capabilities. Now you can engage more testers earlier in the development cycle. Try it for yourself. Download an evaluation copy of IBM Rational AppScan. Click to continue

DOWNLOAD: RIM

Free Download from RIM
BlackBerry Enterprise Server Express offers IT control and security features you can trust even for employees that choose to bring their own BlackBerry smartphones into your business. Download this free license to support up to 75 users on your existing Exchange Server. Download Now.

Five ways to beat the Great Firewall of China
Despite China's best efforts, its citizens can access banned content over the Internet via Google and other means Read More

Howard Schmidt: Cybersecurity Battle 'Different'
White House Cybersecurity Coordinator Howard Schmidt on working with President Obama, gaining access to new resources, and the status of specific cybersecurity initiatives Read More

iPhone, Safari, IE8, Firefox all fall on day one of Pwn2Own
Hackers took down Apple's iPhone and Safari browser, Microsoft's Internet Explore 8 (IE8) and Mozilla's Firefox within minutes at today's Pwn2Own contest, as expected. Read More

Police, security officials meet on cybercrime strategies
When the "ILOVEYOU" worm crippled computer systems worldwide 10 years ago this spring, authorities in the Philippines didn't even have a law to properly charge its author. Read More


WHITE PAPER: Qwest

Connecting to Better Customer Service
Less than a third of surveyed IT executives believe their companies are "highly effective" at adapting to changing customer needs and priorities. Businesses that build a robust voice and data network infrastructure can achieve a high level of responsiveness, and transform customer information and feedback into actionable results. Click here.

Data loss prevention – a priority for 2010
In the last newsletter we began a conversation with Corey Nachreiner, WatchGuard Senior Security Analyst, concerning some points in their "2010 Security Predictions," available at http://www.webtorials.com/content/2010/02/2010-security.html. Read More

Cyberattacks are 'existential threat' to U.S., FBI says
Cyberattacks are a threat to the 'very existence' of the U.S., an FBI officials told an audience at an IT trade show on Tuesday. Read More

Symantec offering Web Monitoring service to detect botnet activity
Symantec Tuesday announced a Web monitoring service intended to unearth evidence of botnet-related malware activity within an organization by continuously looking at outbound HTTP traffic for suspicious signs of Trojans on compromised computers trying to "call home" to their criminal controllers. Read More

Gmail now warns users of suspicious account activity
Google today added an alert to Gmail that warns users of the Web mail service when their account may have been hijacked. Read More


WHITE PAPER: Aruba Networks

Network Rightsizing Best Practices Guide
Network Rightsizing is an evolutionary approach to network design that significantly reduces costs while simultaneously increasing mobility for campus and enterprise users. This guide provides a methodology to enable IT to break away from the status quo of port-based network architectures, allowing an unprecedented reduction in cost and complexity. Read More!

Zero days to infect, but a day and a half to fix
Over the last couple weeks, we've had some interesting security challenges here at my company. Policy compliance has been keeping me busy, and if that weren't enough, we've been having more fun with viruses. Read More

French police make arrest in hijacking of Obama's Twitter account
An unemployed Frenchman who used the online handle Hacker Croll has been arrested by French police for hijacking President Obamas Twitter account, and that of numerous others, according to news service Agence-France Presse. Read More

Cybersecurity bill passes first hurdle
A closely watched bill that promises to introduce some major changes on the federal cybersecurity front was approved by the Senate Commerce Committee today just days after it was introduced by Senators Jay Rockefeller (D-W.Va.) and Olympia Snowe (R-Maine). Read More

Top U.S. domain name registrars lag on DNS security
The leading domain name registrars in the United States appear to be dragging their feet on the deployment of DNS Security Extensions, an emerging standard that prevents an insidious type of hacking attack where network traffic is redirected from a legitimate Web site to a fake one without the Web site operator or user knowing. Read More

Tips for crafting a great workplace IT security awareness program
IT security pros share tips on implementing information security awareness programs in the workplace at SecureWorld Boston Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. The biggest cloud on the planet is owned by ... the crooks
  2. Can the iPhone save higher education?
  3. Five ways to beat the Great Firewall of China
  4. 10 hot data center tools
  5. 25 awesome tech products at DEMO
  6. Top U.S. domain name registrars lag on DNS security
  7. Software tracks employee Facebook, Twitter activity
  8. 21 apps Apple doesn't want on your 3.0 iPhone
  9. Lessons learned from a long IT career
  10. Dorm room, basement, garage, university lab?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment