Friday, April 02, 2010

Eliminating admin rights mitigates Windows 7 vulnerabilities

Google's Chrome now silently auto-updates Flash Player | US one step closer to cyber guards for nation's electric grid

Network World Security

Forward this to a Friend >>>


Eliminating admin rights mitigates Windows 7 vulnerabilities
The removal of administrator rights from Windows users is a mitigating factor for 90 per cent of Critical Windows 7 Vulnerabilities, according to BeyondTrust, a provider of Privileged Access Lifecycle Management solutions. Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

WHITE PAPER: Aruba Networks

Network Rightsizing Best Practices Guide
Network Rightsizing is an evolutionary approach to network design that significantly reduces costs while simultaneously increasing mobility for campus and enterprise users. This guide provides a methodology to enable IT to break away from the status quo of port-based network architectures, allowing an unprecedented reduction in cost and complexity. Read More!

Google's Chrome now silently auto-updates Flash Player
Adobe's new partnership with Google will keep Internet users safer because Chrome will automatically update Flash Player without asking users, an Adobe director of engineering said. Read More

US one step closer to cyber guards for nation's electric grid
The US Department of Energy this week officially opened up the bidding for a National Electric Sector Cyber Security Organization that would protect the nation's electrical grid from cyber attacks.   Read More

5 Playful Tech Pranks
A proper tech prank is a playful problem--mischievous rather than malicious. We've got a few quick tricks that you pull off with just a few minutes of access to your victim's gadgets. Read More


WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

Hotel chain starts using child porn detection
The prestige Radisson Blu hotel chain has become the first in the world to roll out a new technology that can spot guests receiving or distributing real images of child porn. Read More

Living with Windows: security
Under ordinary circumstances, and in the hands of an educated user, a properly configured Mac is not much of a security risk. Sharing a network with Windows systems doesn't change that; the Mac is still relatively safe. Read More

Postmortem: Broken feedback loops in critical systems
A sad story caught my eye in a local paper recently. A 23-year-old anorexic prisoner died in prison in Swanton, Vermont in August 2009 because of a chain of human errors. The tragedy has valuable – if tragic – lessons for all of us involved in mission-critical operations, from controlling production systems through responding to computer intrusions. Read More


WHITE PAPER: Adobe

Collaboration Study: user Trends, IT Opportunities
A recent survey of knowledge workers shows they still rely on familiar collaboration tools such as email and telephone calls, but desire new ways to be more productive. See all the results and find out how IT can embrace current work habits and easily adapt as new technologies emerge. Read More

Covert Investigations: Cameras
Is covert surveillance a necessary part of your investigation? Lux levels, nanny cams and other camera considerations Read More

Adobe, Foxit examine new no-bug-needed PDF hack
Adobe and Foxit Software are investigating attacks based on a new tactic that embeds attack code in rigged PDF documents, the two companies said today. Read More

Forensics, Litigation, and Full Disk Encryption
A few years ago, I boldly predicted that PC encryption would go through a technical transition. My instincts told me that software based encryption from companies like PGP, McAfee (SafeBoot), and Check Point Software (PointSec) would be usurped by laptops and desktops with standards-based (i.e. TCG standards) Self-Encrypting Drives (SEDs). Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. 10 funny April Fools' pranks
  2. Google changes name to Topeka, introduces text-based videos
  3. Google cracks animal translation riddle ... for Android
  4. Silicon cockroaches, 'dirty' IPv4 addresses, other Internet oddities
  5. Tech secrets: 21 things 'They' don't want you to know
  6. Hurdles multiply for H-1B seekers
  7. Fozzie Bear discovers cloud computing
  8. Feel like you're being watched at work? You may be right
  9. The oddest places to find Linux
  10. 4G essentials

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment