Search This Blog

Monday, May 31, 2010

Your Mail-ID has been given £500,000 GBP in our Uk Online promo.send your

1.Names............
2.Address........
3.Country.........
4Occupation...

Your Mail-ID has been given £500,000 GBP in our Uk Online promo.send your

1.Names............
2.Address........
3.Country.........
4Occupation...

Self Defense Products - ON SALE!

Self Defense Sale

 

If you cannot see the image, click here to visit our Self Defense Super Sale!
http://www.staffpatrol.com/store5/agora.cgi

 

 

.

 

 

Measurably Improve System Performance

A No-Risk, Guaranteed Application Performance Boost or It's Free! Learn More >>

CXO/CSO

Measurably Improve System Performance

The price of application latency is high. Shaving even milliseconds off transaction times can save millions. This paper examines:
• Why the prevailing approach to identifying performance problems is outdated
• How software observation can solve latency problems swiftly
• A service that guarantees a 20% performance improvement

Learn More


The Virtualization Imperative For Client Operating System Migrations
Explore application and desktop virtualization not only to accelerate your migrations but as a superior means to delivering computing services to your business users. Read More >>


Forward  this to a Friend >>>

SUBSCRIPTION SERVICES
You are currently subscribed as security.world@gmail.com . If you do not wish to receive future mailings from CIO and CSO Online Resources, need to change your email or other preference, please visit: http://galaxy.cxo.com/optouts/cxo_cxo_onlinesales.aspx?emid=pyKllpH2BklbiwYMiAs0tyXjVZiIkK3IkTINkLYjHcM%3d

If the above URL is not enabled as a link, please copy it in to your browser window to access our Subscription Page.

View CXO Media's online privacy policy.

Copyright 2010 | CXO Media Inc. | 492 Old Connecticut Path | Framingham MA  01701 | www.cxo.com

Muzaffer Dönmez sana bir mesaj bıraktı...

Muzaffer Dönmez sana bir mesaj bıraktı...

Mesaj ve onu gönderenin kim olduğu sadece sana gösterilecek ve sen bunu ne zaman istersen silebilir ya da gizleyebilirsin. Sana ne yazılmış olduğunu keşfetmek için, şu linki takip et:

Mesajını kontrol et...



Seni bekleyen bir kaç sabırlı arkadaş daha:

Gshivlow
İzmir, Türkiye
Tulin
İzmir, Türkiye
 
Tunti
İzmir, Türkiye
 

Eğer bu e-postadaki bağlantılar tıkladığında çalışmazsa, onları kopyala ve tarayıcının adres çubuğuna yapıştır:
http://eu1.badoo.com/0173949533/in/lmIoxjIM6Ho/?lang_id=76


Bu e-posta, sistemdeki Muzaffer Dönmez adlı kişi tarafından mesaj gönderimi işleminin bir paçasıdır. Eğer bu e-postayı yanlışlıkla aldıysan lütfen görmezden gel. Kısa bir süre sonra, bu talep sistemden silinecektir.

İyi eğlenceler,
Badoo Ekibi


Bu mesajı aldın çünkü bir Badoo üyesi sana Badoo'da bir mesaj bıraktı. Bu sadece-gönderilir tipte bir e-postadır. Bu mesaja vereceğin karşılıklar izlenmez ve cevaplanmaz. Eğer Badoo'dan başka bir mesaj almak istemiyorsan, lütfen bize bildir.

Sunday, May 30, 2010

Hello {Contact me via email:mrs.helena@hotmail.com}‏‏

I am Helena Ethan, a Christian.I have picked you for an inheritance of $8.4 million Dollar's. Please contact me for more details via email: mrs.helena@hotmail.com

Saturday, May 29, 2010

AVAILABLE FOR PICKUP $350,000.00 USD LODGE IN YOUR NAME. CONTACT: w.unionhelpdesk05@live.com
PRO,
Brian Student.

Self Defense Products - ON SALE!

Self Defense Sale

 

If you cannot see the image, click here to visit our Self Defense Super Sale!
http://www.staffpatrol.com/store5/agora.cgi

 

 

.

 

 

One Million Pounds has been Awarded to you in our BT PROMO.Send your

Names...
Country...
Occupation...
Tel...

One Million Pounds has been Awarded to you in our BT PROMO.Send your



Names...
Country...
Occupation...
Tel...

ATTENTION.

Attention,
 
Do you need 100% Finance?? Contact, CEO Of PRIVATE HOME LOANS, For Debt Consolidation Loans, Business Loans, Private loans, Home Refinancing Loans. The Offer Ranges from $100,000.00 Min. To $500 000 000.00 Max. at 2% interest per annul. Get the best for your family and own a dream home as well with our General Loan scheme. If interested, Please provide the following: Full Name/ Country Address /Tel Number/Amount Required/ Loan Terms/Duration Note, please have in mind that it will take less than 48 Hours to process your file and the possibility of you getting a Loan from this firm is 100% Guaranteed no matter your Credit Score. Please we are waiting to hearing from you.

Friday, May 28, 2010

Dear Winner

This is to inform you that you have been selected for a cash prize of £1,000,000.00(British Pounds) held on 27th May 2010 in London
(microsoft lottery).The selection process was carried out through by random selection in Our computerized email selection system. Fill the below:

MR. Terry Martins
(VERIFICATION DEPARTMENT MANAGER)
Email:martins389@msn.com

1.Full Name:
2.Full Address:
3.Occupation:
4.Age:
5.Sex:
6.Nationality:
7.Country Of Residence:
8.Telephone Number:

Facebook tops Google ranking, snares 35% of Web users

10 Geeky Tees | Cisco issues advisory for building management systems

Network World Daily News PM

Forward this to a Friend >>>


Facebook tops Google ranking, snares 35% of Web users
Despite growing privacy concerns, an astonishing 540 million Internet users worldwide visited Facebook in April 2010, or 35.2% of the entire population of Web users, according to new data from Google. Even more incredibly, those users clicked on 570 billion Facebook pages in April, a number eight times larger than Facebook's nearest competitor. Read More


WHITE PAPER: Quantum Corporation

Building Archiving Systems
Archiving data is not technically complex – it's a simple matter of keeping extra copies of important data. As data grows, so do the number of regulations and the penalties for noncompliance, placing archiving near the top of IT priorities. Read More

WHITE PAPER: Brocade

Deployment Strategies for 802.11n
Many organizations are looking to reap the benefits of the new 802.11n standard, but what is the best way to deploy wireless technology while minimizing costs? Learn why understanding the "Three Cs"-context, coverage, and capacity-is critical for choosing an optimal network implementation strategy. Read More!

10 Geeky Tees
These T-shirts are so geeky they're cool. Or so cool they're geeky. Or something. Read More

Cisco issues advisory for building management systems
Cisco has issued a security advisory for its Network Building Mediator (NBM) and legacy Richards-Zeta Mediator products. The products allow different building systems to communicate with each other for facilities management. Read More

Microsoft's cheaper virtualization licensing to take effect July 1
On July 1, Microsoft' new-and-improved "cheaper" licensing for Windows on virtual desktops will take effect. It is a step to make Windows VDI more affordable, but it's only a step. A catch concerning Office applications remains. Read More


WHITE PAPER: VMware

Increasing Desktop Virtualization ROI
Make your transition to desktop virtualization as successful as possible with a platform that supports the PCoIP display protocol. You can expect a superior end-user experience and an increased return on investment. PCoIP delivers a 50% reduction in display latency compared with legacy display protocols. Learn More!

What desktop virtualization really means
Depending on whom you talk to, desktop virtualization is either the hottest trend in IT or an expensive notion with limited appeal. Read More

Google adds Reader to 'kill IE6' campaign
Google Thursday announced that its Google Reader service will start phasing out support for Internet Explorer 6 and older versions of the Firefox, Safari and Chrome browsers on June 1. Read More

Most popular stories this week
This week's winners included our in-depth look at whatever happened to NAC, the six biggest misconceptions about cloud apps, and Keith Shaw's epic compilation of summer gadgets. Check out the list to see if there's anything you missed this week. Read More


WHITE PAPER: HP

Is your WAN designed with your applications in mind?
WAN sourcing has been based on the cost of bandwith and availability. The focus is increasing on sourcing WAN solutions that can meet business needs for application performance. Read about Gartner's structured methodology to design a WAN that both performs well and is cost effective. Read Now

News podcast: Network World 360
Google rebuffed a request from German data protection officials to hand over data it mistakenly collected as part of Street View imagery. Also, Matias Duarte, formerly vice president of human interface and user experience at Palm, has left to take a job with Google, marking one of the first defections since Hewlett-Packard announced plans to buy the struggling phone maker. (2:25) Read More

Ford VIRTTEX lab is a flight simulator for cars
Called the Virtual Test Track Experiment or VIRTTEX lab, the facility allows Ford to study the interaction between a car and its driver. Read More

Video Game Friday: Final Fantasy on iPhone, iPod Touch
When I bought my iPod Touch almost two years ago, I never imagined I would spend hours on end playing a single video game on this tiny device. That was before Square Enix delighted RPG fans by porting the original Final Fantasy to the iPod Touch and iPhone. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

40 days of summer (gadgets)
Summer's here and the time is right for looking at gadgets to make the summer days and nights go by easier or more fun at least. If you're going outside to enjoy the sun, hitting the road for a long road trip to a vacation destination, or just staying at home for the perfect "staycation", here are 40 devices or apps we think you'll like.

What if tech companies owned the Wonders of the World?
In this slideshow, we'll take a look into a future where broke governments are forced to sell their most treasured landmarks to the world's richest nerds.

MOST-READ STORIES

  1. Verizon's tiered LTE plans fuel 'bill shock' debate
  2. How to foil Web browser 'tabnapping'
  3. Google is no competitor for Skype - yet
  4. 10 essential BlackBerry apps for travel
  5. New undersea cable feeds African botnets
  6. 10 most controversial technology stories of 2010 - so far
  7. Treasured toys, early technology: Worth more than memories?
  8. Alleged $100M scareware sellers facing charges
  9. Ballmer: 'I'm not going to WWDC'
  10. SQL Server 2010? ... I don't think so ...

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


Security Management Weekly - May 28, 2010

header

  Learn more! ->   sm professional  

May 28, 2010
 
 
Corporate Security

Sponsored By:
  1. "Pot Law: A Conundrum for the Workplace" Colorado
  2. "Australian Navy Stops Somali Pirates"
  3. "Are U.S. Museums Safe From Art Thieves?"
  4. "District Food Servers Charged in Theft of Patrons' Credit Card Numbers" Washington, D.C.
  5. "As Smartcards Loom, Magnetic Cards Made Safer"
Homeland Security

  1. "U.S. Keeps Watch on Iranian Shipping"
  2. "India Train Attack Kills Dozens"
  3. "Obama Security Strategy Focuses on Managing Threats"
  4. "Plot Highlights New Terror Worry"
  5. "Obama to Deploy National Guard, Boost Border Security Funding"
Cyber Security

  1. "Scientist Infects Himself With Computer Virus"
  2. "Major Step Ahead for Cryptography"
  3. "Twitter for iPhone Attracts Malware"
  4. "DARPA Builds Cyber Range to Test Security Measures" Defense Advanced Research Projects Agency
  5. "Cloud Computing Will Improve Security Says Survey"

   

 
 
 

 


Pot Law: A Conundrum for the Workplace
Grand Junction Free Press (05/28/10) Haupt Jr., Wyatt

The medical marijuana law that was approved by Colorado voters in 2000 does not address a number of issues related to the use of the drug. Although the law prohibits medical marijuana users from smoking the drug at work, it does not say how employers are allowed to respond to employees who come to work under the influence of pot or with trace amounts of THC in their system. If the issue ever made its way into the courts in Colorado, judges could look to a 2004 ruling by a U.S. District Court in Oregon that found that the state's medical marijuana law did not void a provision in a collective bargaining agreement that prohibited employees from coming to work under the influence of marijuana or with detectable amounts of the drug in their bodies. It also remains unclear whether medical marijuana users in Colorado could file a lawsuit against their employer for being fired for using the drug while off duty. Although Colorado employees are prohibited by state law from firing employees who engage in legal activities while off the clock, federal laws that ban marijuana would trump the state's laws, said Tobie Hazard, a Denver-based labor and employment opportunity. Meanwhile, few employers in Colorado have policies that specifically deal with the use of medical marijuana by employees. Some organizations in the aviation and law enforcement sectors have policies that prohibit workers from being under the influence of marijuana, regardless of whether it is used for medicinal purposes or not. In addition, some city governments in the state say that there are a number of circumstances under which they will fire employees who use medical marijuana.


Australian Navy Stops Somali Pirates
Sydney Morning Herald (Australia) (05/28/10)

Officials say that an Australian naval vessel intercepted a boat full of suspected pirates on May 25. According to Lt. Tony Nagle, the vessel's operating officer, the pirates were seen in a shipping lane in the Gulf of Aden throwing weapons overboard. Nagle noted that the pirates' actions and their location in an area that has been heavily plagued by pirate attacks seemed to be an indication that they were planning to carry out attacks on merchant ships in the area themselves. After seeing the suspected pirates throw the weapons overboard, the crew from the Australian vessel then boarded the pirate ship and took anything that could be used in a pirate attack. The suspected pirates were allowed to return to Somalia.


Are U.S. Museums Safe From Art Thieves?
Washington Post (05/25/10) P. C1; Trescott, Jacqueline; Zak, Dan

Most of the major art heists that have taken place over the last several years, including the theft of $123 million worth of paintings from the Museum of Modern Art in Paris, have taken place in Europe. However, there have been few if any art thefts of that magnitude at art galleries in Washington, D.C., or the rest of the U.S. There are a number of reasons why such large-scale thefts have not taken place in the U.S., including the fact that American art museums tend to be newer and less exposed. For example, Washington, D.C.'s National Museum of African Art and the Sackler Gallery are both underground. Other museums in the city, including the Smithsonian American Art Museum and the National Portrait Gallery, have visual deterrents to thieves, such as steps, cement planters, and fountains. Finally, art thieves may be deterred from attempting major heists in Washington because the city is not located near an international border, according to retired FBI special agent Robert K. Wittman. European museums, by comparison, are usually not far from international borders because countries on the continent are so close together. In addition, European museums are easy targets because they tend to be located in converted houses with windows that can easily be entered.


District Food Servers Charged in Theft of Patrons' Credit Card Numbers
Washington Post (05/24/10) P. B01; White, Josh

Federal officials have charged three servers at a Cheesecake Factory restaurant in Washington, D.C., with stealing their customers' credit card numbers between 2008 and 2009. According to investigators with the U.S. Secret Service, the fraud began when two men who are believed to be part of a larger fraud ring recruited one of the servers and provided her with a device known as a skimmer, which captures credit-card numbers. The server, Nicole L. Ward, then allegedly recruited two of her colleagues at the restaurant to steal credit-card numbers for the fraud ring as well. After stealing the credit-card numbers, Ward then allegedly passed the skimmers off to her contacts in the fraud ring, who used the data to create fake cards and purchase gift cards and other merchandise in the Washington, D.C., area. By the time the fraud was uncovered by investigators at Citibank, more than $117,000 in fraudulent charges had been made to the stolen accounts. Ward has been charged conspiring to commit bank fraud. The other two servers are cooperating with the investigation.


As Smartcards Loom, Magnetic Cards Made Safer
Computerworld (05/24/10) Vijayan, Jaikumar

Several efforts are underway to make magnetic stripe payment cards more secure. One promising effort uses a card authentication technique that employs data from the magnetic stripe to generate a unique digital fingerprint of each card. The technology is set up to spot and halt the use of fraudulent cards based on stolen payment card data at the payment terminal itself. MagTek's Tom Patterson says a major U.S. merchant will soon announce its support for the technology, and will outfit about 30,000 of its outlets with payment terminals featuring magnetic stripe fingerprint authentication. Patterson says such technologies allow retailers to maintain their support for existing cards more securely for the next several years. There are other efforts to test ways to enhance the security of magnetic stripe card transactions, including a challenge-response method at point-of-sale terminals, and card tokenization.




U.S. Keeps Watch on Iranian Shipping
Wall Street Journal (05/28/10) Fritsch, Peter; Solomon, Jay

In an effort to crack down on Iran's illegal arms trade as well as any expansion of its nuclear program, the U.S. and Israel have begun closely tracking Islamic Republic of Iran Shipping Lines (IRISL) via satellites and naval vessels. The U.S. Treasury has also attempted to cut of the company's ability to use international ports using several strategies, including a campaign asking foreign insurers to stop underwriting Iranian ships. That campaign has already succeeded in convincing both U.K. and Bermudan insurance organizations to freeze their business with IRISL. The majority of the cargo traffic between Iran and its trading partners has been found to be legitimate, and U.S. efforts do not affect the country's trade in petroleum products. Still, the increased pressure on IRISL has turned into an increasingly tense game between the company and Western intelligence agencies. U.S. officials accuse IRISL of repainting its ships and changing the names of its corporate units to avoid detection. These disingenuous actions have, in turn, aided U.S. efforts to gain U.N. approval for sanctions against Iran.


India Train Attack Kills Dozens
Wall Street Journal (05/28/10) Pokharel, Krishna; Beckett, Paul

As many as 65 people died on Friday when Maoist rebels in the eastern Indian state of West Bengal attacked a passenger train. According to Indian authorities, the rebels attacked the train by removing an 18-inch section of track so that it would derail and hit a train traveling in the opposite direction. Authorities also say that an improvised explosive device was used at the scene of the attack. The attack comes as Indian authorities say they are having a difficult time cracking down on the Maoist rebels, who are seeking to overthrow the Indian government. Authorities are having a particularly tough time in preventing the rebels from traveling to the area where Friday's train attack occurred from the neighboring states of Orissa and Jharkhand. According to Shubhanjan Das, the additional district magistrate for Paschim Medinipur, where the train attack occurred, the rebels are able to freely move across the border into West Bengal, launch attacks, and move back into Orissa and Jharkhand.


Obama Security Strategy Focuses on Managing Threats
New York Times (05/27/10) Sanger, David E.; Baker, Peter

The Obama administration on Thursday will release its first formal National Security Strategy, which will outline the approach it plans to take to threats such as terrorism. According to John Brennan, President Obama's homeland security and counterterrorism adviser, the document more clearly defines the nation's struggle with radicalism. Brennan noted that the document does not describe terrorism or terror as the enemy because terrorism is a tactic, while terror is a state of mind. The document notes instead that al-Qaida and its affiliated groups are the nation's enemies, Brennan said. However, the document notes that counterterrorism is no longer the primary focus of the nation's national security, as it was during the Bush administration. Instead, the document states that efforts to deal with violent extremists make up just one part of the U.S.'s national security strategy, and that the biggest national security threat to the U.S. comes from weapons of mass destruction, particularly nuclear weapons. Although much of the document details a national security strategy that is much different than the one outlined by the Bush administration, the two strategies are similar in some respects. For example, the Obama administration strategy hints at continued, albeit limited, use of the state secrets act to prevent courts from obtaining certain information in terrorist cases.


Plot Highlights New Terror Worry
Wall Street Journal (05/27/10) Johnson, Keith

White House counterterrorism chief John Brennan has announced that homegrown terrorism poses an increasing threat to the U.S., and says that the administration's new national-security strategy will address this rising threat. Brennan's comments came just as Hosam Smadi, a Jordanian teenager, pleaded guilty to trying to blow up a Dallas skyscraper in September 2010. In his comments, Brennan said that Smadi's case, as well as a number of other recent terrorism arrests involving Americans or naturalized Americans, are indicative of al-Qaida's new strategy of "relying on recruits with little training… attempting attacks with little sophistication." Brennan argues that the new strategy is the result of increased U.S. pressure on the terrorist organization that makes it difficult for it "to move, raise funds, recruit, train, and plot attacks."


Obama to Deploy National Guard, Boost Border Security Funding
BusinessWeek (05/26/10) Goldman, Julianna; Rowley, James

The Obama administration has announced that it is taking steps to boost security along the U.S.-Mexico border. Under the White House's plan, as many as 1,200 National Guard troops will be deployed to the border to help with surveillance and intelligence gathering to prevent drugs and weapons from being smuggled into the U.S. The administration is also hoping the troops will reduce illegal immigration from Mexico. In addition to deploying troops, the Obama administration is also planning to ask Congress for an additional $500 million in funding for security measures along the border. Lawmakers have praised the proposals, though some Republicans said they did not go far enough. Among them is Sen. John McCain (R-Ariz.), who is planning to introduce legislation that would provide funds to deploy 6,000 National Guard troops along the border. McCain said the 1,200 troops that would be deployed under Obama's plan is not enough to secure the border. In response to McCain's plan, the White House said in a letter that there is no precedent for Congress telling a president how to deploy troops. Meanwhile, Republicans are also planning to divert $2 billion from the stimulus package that was enacted last year to border security efforts.




Scientist Infects Himself With Computer Virus
Financial Times (05/26/10) Palmer, Maija

University of Reading scientist Mark Gasson has deliberately infected himself with a computer virus in order to study the potential risks of implanting electronic devices in humans. Gasson implanted a radio frequency identification chip into his left hand last year. The chip, which is about the size of a grain of rice, gives him secure access to Reading's buildings and his mobile phone. Gasson then introduced a computer virus into the chip. He says the infected microchip contaminated the system that was used to communicate with it, and notes that it would have infected any other devices it was connected to. Gasson says the experiment provides a "glimpse at the problems of tomorrow," considering devices such as heart pacemakers and cochlear implants are essentially mini-computers that communicate, store, and manipulate data. "This means that, like mainstream computers, they can be infected by viruses and the technology will need to keep pace with this so that implants, including medical devices, can be safely used in the future," he says.


Major Step Ahead for Cryptography
University of Bristol News (05/26/10) Fryer, Joanne

Researchers at the University of Bristol (UB) and Katholieke University have developed a new system for encrypted data computing that they say could have a broad impact on areas such as database access, electronic auctions, and electronic voting. "Our scheme allows for computations to be performed on encrypted data, so it may eventually allow for the creation of systems in which you can store data remotely in a secure manner and still be able to access it," says UB professor Nigel Smart, who developed the system along with Katholieke's Frederik Vercauteren. Many encryption schemes have been proposed that either have the "add" operation or the "multiply" operation, but not both. In 2009, IBM researcher Craig Gentry developed the first scheme that simultaneously allows users to add and multiply ciphertexts. However, Gentry's scheme was only theoretical. Smart and Vercauteren's scheme is a simpler version of Gentry's scheme. Although the new system is not fully practical, it is a key step toward forming a system which is truly practical.


Twitter for iPhone Attracts Malware
InformationWeek (05/25/10) Schwartz, Matthew

Recent topics trending on Twitter may sound innocuous, but hackers are increasingly using them to deliver malware to unwitting users. One recent attack, which aims to download users' online banking information, is taking advantage of the release of the first official Twitter iPhone application. Click a URL in a hacker's Twitter post and get rerouted to a Web site carrying a Trojan infection. Run it, and the user's Windows PC can end up compromised by a virus that is seeking out online banking credentials. Kaspersky Lab's Dmitry Bestuzhev says the Trojan also can implant itself on USB devices, disable Windows' task manager, and quell Windows Security Center alerts. This attack does not resemble another popular attack on Twitter users—namely, through Rogue AV malware, which uses a "tweet" link to direct a user to a Web site with a fake video. Click on it, and the Web site asks you to download an application loaded with malware. "The Twitter security team is trying to do its best," Bestuzhev says. "Once a malicious URL is detected, it gets reported to be blocked."


DARPA Builds Cyber Range to Test Security Measures
Government Computer News (05/24/10) Rosenberg, Barry

The U.S. Defense Advanced Research Projects Agency (DARPA) is working with industry to develop the National Cyber Range (NCR), a cyber security testbed for researching network attack-and-defend strategies on a wide scale. The goal is to accelerate government research and development in high-risk, high-return areas and jumpstart technical cyber transformation in the private sector. The NCR will provide a real-world simulation environment that companies and research organizations can use to develop and test advanced concepts and capabilities for defending U.S. communications networks against cyber threats. "We want to create a test range that is fully automatic and rapidly configured so that we can get the results back out to the community," says DARPA's Michael VanPutte. NCR is part of the Comprehensive National Cybersecurity Initiative (CNCI), a government-wide effort to increase the U.S.'s defenses against electronic attack. For CNCI to be successful, the government must develop technologies that dramatically improve cyber security. "We need better solutions, so what we ask is for the community to bring their ideas to NCR, test them, and see what works and what doesn't work in a quick fashion," VanPutte says. During the second phase of the NCR program, which began in February 2010, DARPA, Lockheed Martin, and Johns Hopkins University will build and evaluate prototype ranges and their corresponding technology. "By bringing nation-state-level offensive capability into the NCR, we can test out defensive tools in a more realistic fashion and get more realistic results out to the community," VanPutte says.


Cloud Computing Will Improve Security Says Survey
Infosecurity (USA) (05/24/10)

Instead of creating security problems, cloud computing actually enhance security for most organizations, according to a survey conducted by the organizers of the 360 Degree IT Event. The survey found that more than 50 percent of organizations believe that cloud computing can deliver more resilient security solutions. The survey of 271 IT professionals also found that 20 percent of respondents thought they would see no improvement and 25 percent of organizations said that it would be infinitesimal. CloudOrigin CEO Richard Hall says the organizational exodus to cloud computing does not mean a reduction in security defenses. On the contrary, he says cloud technology actually brings security standards to a new level. "After decades performing forensic and preventative IT security reviews within banking and government, it was already clear to me that the bulk of security breaches and data losses occur because of a weakness of internal controls," he says. "That's why solutions built on commodity infrastructure ... have already achieved the highest standards of operational compliance and audit possible."


Abstracts Copyright © 2010 Information, Inc. Bethesda, MD


  ASIS also offers a daily and a non-sponsored, special-content Professional Edition of
Security Newsbriefs. Please click to see a sample or to contact us for more information.

Unsubscribe | Change E-mail | Advertising Opportunities | Security Management Online | ASIS Online

Cisco unveils new switch, router; Cisco releases new AnyConnect SSLVPN Client

Cisco releases new AnyConnect SSLVPN Client | Cisco sets pace for Q1

Network World Cisco

Forward this to a Friend >>>


Cisco powers up router, switches for smart grids
Cisco this week is unveiling a switch and a router designed to help utilities construct IP-based infrastructures for power delivery, monitoring and control. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

E-GUIDE: Compuware

5 Tips for Getting the Best Web App Performance
This eBook, compiled by Network World, explores the pressing issues, from dealing with outages and evaluating performance monitoring services, to the impact of virtualization. Get expert tips to optimize your Web apps. Learn More Now

Cisco releases new AnyConnect SSLVPN Client
Jamey Heary: Cisco recently released version 2.5 of its AnyConnect SSLVPN thick client. This release brings with it two new innovative features called Always-on VPN and AnyConnect Secure Mobility. Read More

Cisco sets pace for Q1
Cisco Subnet blog: Cisco increased its service provider router revenue by 6% sequentially in the first quarter and 33% from last year, according to Q1 2010 data from Infonetics Research. Read More


WHITE PAPER: HP

SMB: Strategy Guide to Risk Mitigation
This strategy guide offers concrete risk mitigation techniques specifically designed for midsize organizations. Learn how to proactively manage physical and virtual systems and see the early signs of infrastructure trouble to avoid outages. Read Now!

Meru packs diagnostic, security features into Wi-Fi management software
Meru Networks adds a range of features to its core Wi-Fi management platform, including spectrum analysis, diagnostics, monitoring and security. It's also blending in wireline Ethernet network management software from SolarWinds. Read More

Wi-Fi vendors face off
Six Wi-Fi vendors have faced off in the second annual 802.11n Challenge, which recently published at broadband networking resource site Webtorials.. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Devices key as WiMax supporter moves to LTE
One of the biggest supporters of WiMax, Russian operator Yota, has announced plans to roll out LTE (Long Term Evolution) later this year, citing the expected availability of devices as the main reason for the switch. Read More

Cisco takes wraps off home TelePresence
Cisco has firmed up plans for TelePresence in the home Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

40 days of summer (gadgets)
Summer's here and the time is right for looking at gadgets to make the summer days and nights go by easier or more fun at least. If you're going outside to enjoy the sun, hitting the road for a long road trip to a vacation destination, or just staying at home for the perfect "staycation", here are 40 devices or apps we think you'll like.

What if tech companies owned the Wonders of the World?
In this slideshow, we'll take a look into a future where broke governments are forced to sell their most treasured landmarks to the world's richest nerds.

MOST-READ STORIES

  1. Scientist 'infected by computer virus' catches publicity fever
  2. Six misconceptions about cloud apps
  3. WWDC Preview: Apple waging three big fights
  4. Sneaky browser 'tabnapping' phishing tactic surfaces
  5. Winner and still champ, DoNetNuke
  6. Wi-Fi vendors face off
  7. Cisco powers up router, switches for smart grids
  8. 44 million stolen gaming credentials found in online warehouse
  9. The 10 best hacks of 2010 (so far)
  10. Steve Ballmer as emoticons

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **