Search This Blog

Wednesday, April 07, 2010

The Cloud Security Newsletter - April 2010 Edition

The Cloud Security Newsletter
The most trusted source for security and IT professionalsApril 2010 Edition

Internet Explorer Exposed to Unpatched 0 Day Vulnerability Once Again

On March 9, 2010, Microsoft announced the existence of a critical vulnerability in Internet Explorer (IE) 6 and 7. Despite the fact that a patch was not available, Microsoft chose to go public with details of the issue and provide workarounds. Compounding the risk of this vulnerability is the fact that enterprises have been relatively slow to adopt the latest version of Internet Explorer (IE 8), which is not vulnerable to this issue. IE 6, a nearly nine-year-old web browser, continues to dominate and has created significant risk for enterprises. Learn More
It's Midnight — Who Left the "Backdoor" Open? Your Employees.
In light of the recent Operation Aurora attacks, there has been a lot of discussion around Advanced Persistent Threats (APT). The attack methods are similar to general threats, but they usually target corporate end users and extend over longer periods of time. Sounds simply like marketing buzz? Unlikely if over 100+ public companies with strict IT operations fell victim. Although there is no silver bullet to protect against APTs, understanding their anatomy is essential in order to assess the risks to your organization. Learn More
Strategic Data-mining Uncovers Botnets
Zscaler's Security Research team is actively engaged in analyzing and trending real-time web logs from millions of customers around the clock. The most recent research has uncovered some very interesting and alarming data about end user web usage. In particular, the vulnerability of organizations in Operation Aurora is no longer a surprise. Moreover, statistical analysis of transaction data also uncovered botnet call home activity which was going undetected by customer desktop anti-virus solutions. Learn More
Clickjacking: Bait & Switch Hits The Browser
There's a serious threat called clickjacking waiting to convert your daily secure Web browsing into a malware nightmare.
Security Hardware Appliances: Killed By the Cloud?
Cloud-centric security is pressuring traditional on-premise security appliances
Koobface Crew Has a Busy Weekend
The number of command and control servers tied to Koobface jumped to 122 March 14 – 57 percent of which were in the United States.
Zscaler Positioned in the Visionaries Quadrant of the Magic Quadrant for Secure Web Gateway
Zscaler Publishes 'State of the Web' Report for Q4 2009
Research Details Trends and Security Threats for Corporate End Users on the Web 
"We use Internet with local accesses in all our locations. We want to secure our traffic!"
- Laurent Hallermeier, CIO ALD Automotive (Societe Generale)
ALD Automotive's rapid growth of its leasing and fleet management operations in 39 countries has introduced extensive IT infrastructure complexity. Managing numerous on-premise security solutions was cumbersome and log consolidation across sites was extremely tedious.  Learn More
Death of Security Appliances – Hype or Reality?
A Pragmatic Approach to Embracing Cloud Security
Date: April 21, 2010 at 10:00 AM PST / 1:00 PM EST
Join Jim Reavis, Co-founder and Executive Director of the Cloud Security Alliance (CSA), to learn about the challenges that organizations are facing with their traditional appliance-based security solutions. Live demos will illustrate Web 2.0 exploits facing your organization today. Register Now
Webcast with keynote from Gartner
Google was victimized by hackers. Will you be next?
Play On-demand
If you or your colleagues would like to receive this newsletter, please Sign up.
Copyright 2010 Zscaler, Inc.
392 Potrero Avenue, Sunnyvale, CA 94085 | 1.866.902.7811 |

Note: Your e-mail is in our mailing list as, if you wish to be removed from our mailing list please use the link below to unsubscribe from any future mailings. We will respect all unsubscribe requests

No comments: