Monday, April 05, 2010

DHS studying global response to Conficker botnet

Endpoint security gets complicated | Escalating attacks prompted emergency IE update, says Microsoft

Network World Security

Forward this to a Friend >>>


DHS studying global response to Conficker botnet
One year after the Conficker botnet was front-page news around the world, the U.S. Department of Homeland Security is preparing a report looking at the worldwide effort to keep it in check. Read More


WHITE PAPER: Cisco Systems Inc.

Improve Productivity by Optimizing your SSL VPN
Are you getting all you can from your SSL VPN? Read this whitepaper to find out Learn More

WHITE PAPER: Aruba Networks

Network Rightsizing Best Practices Guide
Network Rightsizing is an evolutionary approach to network design that significantly reduces costs while simultaneously increasing mobility for campus and enterprise users. This guide provides a methodology to enable IT to break away from the status quo of port-based network architectures, allowing an unprecedented reduction in cost and complexity. Read More!

Endpoint security gets complicated
Users say protecting network endpoints is becoming more difficult as the type of endpoint devices -- desktops, laptops, smartphones -- grows, making security a complex moving target. Read More

Escalating attacks prompted emergency IE update, says Microsoft
Microsoft said that it patched the critical vulnerability in IE this week because the number of attacks jumped after news broke that the exploit had gone public. Read More


WHITE PAPER: Dell

Automating Processes to Optimize a Windows 7 Deployment
Experts state that it is critical that planning for Windows 7 starts in the first half of 2010. With the cost per PC deployment estimated at $527-$700 per client, automating processes and leveraging outside expertise can reduce deployment costs and free your staff. Learn More Now

Bringing Internet privacy into the 21st century
Finally, there's something Google and Microsoft can agree on: Our electronic privacy protections are in serious need of an overhaul. They, along with Intel, AOL, AT&T, the ACLU, and a dozen other household names, have formed the Digital Due Process coalition, aimed at urging Congress to modernize the Electronic Communications Privacy Act (ECPA) -- the only thing keeping Johnny Law from pawing through your digital life. Read More

Security Development Lifecycle still just a concept to many
As a reporter for a publication focused on software development two years ago, I wrote a couple stories about how first software was developed so it did what it was designed to do, then they'd worry about security. So learning since then that security is being built into the development lifecycle from the beginning is encouraging, though it seems like it's still just a concept. Read More


WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

Document offers gloomy view of cloud
The Office of the Privacy Commissioner of Canada recently published a document about cloud computing titled "Reaching for the Cloud(s): Privacy Issues related to Cloud Computing." I didn't like this document at all. Read More

US wants texting ban for bus, truck drivers; takes to Web for online rule-making
The US Department of Transportation wants to not only ban texting by commercial bus and truck drivers, its also wants the public to get more closely involved developing transportation regulations via a new public Web site.   Read More

Network World launches Open Source Subnet
I'm pleased to announce our news. Network World has launched a new Subnet community, the Open Source Subnet. Open Source Subnet will showcase news and blogger opinions for enterprise users of open source software. Read More

Unscheduled patch release from Microsoft? Pay attention
It's good and bad that Microsoft releases out-of-band patches. It's good the company is being proactive to help equip customers against threats, but it's bad the vulnerabilities pose such a potential risk that immediate action is a must.Microsoft out-of-band patch demands immediate attention Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. Google cracks animal translation riddle ... for Android
  2. Google's April Fools hoaxes in 2010
  3. How Google wants to change telecom
  4. Verizon gets the iPhone!
  5. 10 funny April Fools' pranks
  6. Will the iPad live up to the hype?
  7. Silicon cockroaches, 'dirty' IPv4 addresses, other Internet oddities
  8. Endpoint security gets complicated
  9. The oddest places to find Linux
  10. Hotel chain starts using child porn detection

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment