Search This Blog

Wednesday, April 07, 2010

Special Report on the Cyberwar threat; What South Park has taught us about tech

'Cyber War' author: U.S. needs radical changes to protect against attacks | In cyberwar, who's in charge?

Network World Daily News PM

Forward this to a Friend >>>


Is the U.S. the nation most vulnerable to cyberattack?
Several nations, most prominently Russia, the People's Republic of China and North Korea, are already assembling cyber armies and attack weapons that could be used to attack other nations. Given that the United States is heavily dependent on technology for everything from computer-based banking to supply-chain tracking and air-traffic control, it's particularly vulnerable to the denial-of-service attacks, electronic jamming, data destruction and software-based disinformation tricks likely in a cyberattack. Read More


E-GUIDE: APC by Schneider Electric

5 Ways to Shrink a Data Center
Most data centers can support an average density of 100 to 200 watts per sq. foot. The future of high-density computing – beyond 30 KW - will have to rely on water-based cooling, but is that cost effective? This expert guide discusses the latest energy technologies for today and the future. Read Now.

In this Issue


WHITE PAPER: Websense

Essential Information Protection
Successful organizations depend upon their ability to collaborate, communicate, and share information online. This paper explains how Essential Information Protection is designed to help organizations make the most of their IT security investments. Read More

'Cyber War' author: U.S. needs radical changes to protect against attacks
Ex-Presidential advisor Richard Clarke writes: "U.S. military is no more capable of operating without the Internet than Amazon.com would be." Read More

In cyberwar, who's in charge?
When the first salvos of cyberwar are fired against the United States, the responsibility to defend the country falls to the president who, aided by advisers from the broad spectrum of government agencies and also the private sector, must feel his way along an uncertain path to decide the appropriate response. Read More

Botnets 'the Swiss Army knife of attack tools'
Hacker militias reach for the closest tool at hand -- botnets already up and running, already reaping ill-gotten gains -- when they mobilize to attack the information infrastructure of other countries, security experts say. Read More

From CyberWar: The Next Threat to National Security and What to Do About It
Cyber war is not some victimless, clean, new kind of war that we should embrace. Nor is it some kind of secret weapon that we need to keep hidden from the daylight and from the public. For it is the public, the civilian population of the United States and the privately owned corporations that own and run our key national systems, that are likely to suffer in a cyber war. Read More

Estonia readies for the next cyberattack
More than anyone else, Jaak Aaviksoo has first-hand knowledge of what a cyberwar might feel like. In April 2007, Estonia's banking, media and government presence online was disrupted by several waves of distributed denial of service attacks that knocked services offline. The country is heavily wired -- 90 percent of all financial transactions are conducted over the Internet and 70 percent of the population files their tax returns electronically -- so the incident was widely felt by the country's 1.3 million citizens. Read More

Think tank ponders war in cyberspace
When one nation launches a missile at another, it's easy to pinpoint the aggressor. But during a cyber attack, the aggressor may not be so identifiable, and the traditional rules of warfare don't quite fit. Read More

Targeted cyberattacks test enterprise security controls
Targeted cyberattacks of the sort that hit Google and more than 30 other tech firms earlier this year are testing enterprise security models in new ways and pose a more immediate threat to sensitive data than a full-fledged cyberwar. They're also an "existential threat" to the U.S., a top FBI official said last week. Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

After Google-China dust-up, cyberwar emerges as a threat
Few events have crystallized U.S. fears over a cyber catastrophe, or brought on calls for a strategic response, more than the recent attacks against Google and more than 30 other tech firms. The company's disclosure in January that it was attacked by China-based hackers -- and its subsequent decision to scale back operations there -- have stoked long-standing fears over the ability of cyber adversaries to penetrate commercial and government networks in the U.S. Read More

Schmidt: Private Sector Key to Stopping Google-style Attacks
Recent attacks against Google point to a danger White House Cybersecurity Coordinator Howard Schmidt says we must confront. But the key to victory is not in the government. Read More

What South Park has taught us about technology (slideshow)
Facebook is just the latest high-tech South Park skewering: iPhone, Bill Gates, Star Trek, the Internet all get lampooned Read More

Speculation swirls about Yahoo eyeing Foursquare
A report that Yahoo is sniffing around at hyperlocal social networking company Foursquare has Web watchers buzzing this week. Read More

Five Predictions for iPhone OS 4.0
Apple didn't even wait for the iPad dust to settle before summoning the media to its next big event. On Thursday, journalists will gather once again ostensibly to hear about the next-generation of the iPhone operating system, and possibly an unveiling of the next-generation iPhone hardware. Read More

Many managers see cloud computing as risky business
A recent ISACA survey shows many IT managers still wary of using cloud computing Read More

Unvarnished: New Social Network Could Ruin Your Reputation
'Unvarnished' is a new website that's been stirring up a lot of controversy--and it's not hard to see why. The site offers people the ability to rate, review, and give opinions about others' professional performance--anonymously, and without censorship. Read More


WHITE PAPER: AccelOps

IT Service Management: Beyond the Myths
Discover best practices and supporting technologies that deliver the straightest path to service reliability, operational efficiency and effective ROI. Also, examine three case studies that show how IT service management works in the real world. Read More!

Microsoft's Pink phone to come in two designs, a clamshell and a candy bar
Microsoft's new cell phone, code-named Pink, will come in several lively colors and two form factors: a clamshell that twists open and a candy-bar shape, both fashioned to please the young social-networking crowd that Microsoft has so sorely failed to attract in recent years. Read More

Facebook takes steps to deal with gift card scams
Like many other Facebook users Jeff Crites heard of the US$1,000 Best Buy gift-card offer last month from a friend, a Web savvy director of social media at a Fortune 500 company. Read More

Election kills 'broadband tax' bill
It now looks likely that the contentious 'broadband tax', a levy to help fund broadband investment in the UK, will not now happen. Read More

Bebo faces axe after user numbers plunge
Only two years after buying Bebo for $850 million (£450 million at 2008 exchange rates), AOL could be about to shutter the social network everyone has heard of but few seem to use. Read More

The future of MySQL in a post-Sun world
Oracle's control of the MySQL copyright could create new licensing headaches and bundling limits for customers Read More

Microsoft cites no-email crawl pledge
Unlike Google, Microsoft will not scan its hosted mail to target ads Read More

iPad Users: Good Luck With Those Wi-Fi Problems
If your iPad is having trouble connecting to the Internet due to Wi-Fi issues, we have good news and bad news. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. Cisco launches new servers, switches, SANs
  2. Wormy attack could spread via PDF
  3. How the FCC can still move on net neutrality
  4. Ruling suggests limits on employer's access to personal e-mail
  5. From Cyber War: The next threat to national security
  6. Verizon follows Comcast lead on IPv6
  7. Enterprise cloud put to the test
  8. Is the U.S. the nation most vulnerable to cyberattack?
  9. Tech euphemisms: What those error messages really mean
  10. The iPad and accessories: What you need to know

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: