Search This Blog

Thursday, July 15, 2010

Will security worries propel DNS into the cloud?

  10 Technologies That Should Be Extinct (But Aren't) | ZeuS Trojan attempts to exploit MasterCard, Visa security programs
 
  Network World Daily News AM

Forward this to a Friend >>>


Will security worries propel DNS into the cloud?
Security on the Internet's Domain Name System will be tightened today, with the addition of digital signatures and public-key encryption to the root zone. But will the deployment of DNS Security Extensions (DNSSEC) prompt more enterprises to outsource their DNS operations? Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Shoretel

Simplify System Management
Telephone system manageability depends to a great extent on the underlying architecture of the voice system. The architectural approach for integrating new systems has serious implications for management. In this paper you will learn more about how various architectural approaches impacts overall system manageability. Read now!
 

10 Technologies That Should Be Extinct (But Aren't)
These obsolete technologies didn't get the memo -- maybe because someone wrote it on a typewriter and faxed it to them. Read More

ZeuS Trojan attempts to exploit MasterCard, Visa security programs
The notorious ZeuS banking Trojan is showing off a new trick: Popping up on infected computers with a fake enrollment screen for the "Verified By Visa" or "MasterCard SecureCode Security" programs. Read More

Sprint makes a case for enterprise WiMAX
Although Sprint may be having trouble getting enough HTC EVO 4G phones out the door quickly, there can be no doubt that the carrier's 4G WiMAX network is the fastest game in town. Read More


Cisco Linksys among "millions" of hackable routers
Ever want to hack into millions of routers? Or try to stop someone from doing so?Perhaps a discussion at the upcoming Black Hat conference in Las Vegas will help you in either or both goals. And its title, "How to Hack Millions of Routers," cuts right to the chase too. Read More

Most U.S. states seek Google's fiber network help
Communities in every U.S. state but three -- Delaware, Florida and South Dakota -- have applied to become test markets for Google's planned high-speed broadband network. Read More

10 Communication Mistakes CIOs Still Make
CIOs' communication skills have come a long way since the days of data processing. But they continue to make many communication mistakes that hamper their effectiveness on the job or hinder their relationships with staff and other executives. Read More


WHITE PAPER: Qualys

Justifying IT Security
The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk. Read now!

Mozilla yanks password-stealing Firefox add-on
Mozilla on Tuesday warned users that a password-stealing add-on slipped into Firefox's extension gallery more than a month ago had been downloaded nearly 2,000 times before it was detected. Read More

Verizon creates medical information exchange cloud
Verizon has announced it is getting into the business of health information exchange by using its cloud storage service offering as the platform for sharing information between healthcare providers, no matter the format used to create and store it. Read More

IE8 and Chrome Are Killing Firefox
I used to love Firefox. I'm an old Linux user that ran Mozilla on the Red Hat Linux desktop that kept me efficient while I was working for a dot-com before the bust. Back then I had to manage a Windows and Linux network with some AIX thrown in, so being able to run Linux was a life-saver, and having a decent browser like Mozilla didn't hurt. Read More

If Windows XP survives another decade, we have failed as a society
Attention technology-obsessed American public: Put down that Apple iPad. Throw away your Droid Incredible. Cancel that pre-order of the Nintendo 3DS. And for the love of Bill Gates, don't you dare buy a Windows 7 computer. That's right: all those newfangled devices are irrelevant. Let's clear them off the agenda and focus on a real problem: will we be able to use Windows XP in the year 2020? Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Robocop ran DOS
Virtually no sci-fi or action flick these days is complete without a computer scene showing a few screens of mysterious scrolling text and a 3D wire-frame model. But where does this vaguely tech-looking stuff come from? Well, more often than not, it comes from a Website, app, or startup screen from the real world at the time the movie was made. Read on for some of the most unexpected tech cameos in movies.

Top Russian spy ring technology screw-ups
Alleged Russian spies arrested last month in cities around the United States seemed to be lacking in spycraft and in urgent need of some IT expertise, based on some of the gaffes they made. They also used some technologies effectively. Here is a summary of their efforts as revealed in court filings against them.

MOST-READ STORIES

  1. Researchers find privacy flaws in Chatroulette
  2. Bluetooth at heart of gas station credit-card scam
  3. Newest attack on your credit card: ATM shims
  4. 8 amazing things you'll do with Windows 8
  5. Social network sites: Block or not?
  6. Microsoft punches Cisco, VMware in the eye
  7. Cisco rival Brocade for sale again?
  8. Apple's iPhone 4 fiasco: There's no good way out
  9. VMware says: Windows still matter ... sort of
  10. Windows XP SP2 and 7 other things Microsoft has killed this year

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: