Search This Blog

Tuesday, August 31, 2010

Microsoft boosts access to secure development guidelines

  Error Reporting Oops: Microsoft, Meter Maids and Malicious Code | 3M offers $943M for biometric security vendor Cogent Systems
 
  Network World Security

Forward this to a Friend >>>


Microsoft boosts access to secure development guidelines
Company hopes more developers will take up SDL best practices with move to Creative Commons license Read More


WHITE PAPER: Tripwire

Where Compliance and Data Protection Overlap
Today's CISOs face more challenges than ever, including increased and more sophisticated threats, complex IT environments, decreased budgets, and greater compliance pressures. But these challenges present opportunity. Learn how CISOs can play these challenges to their advantage to meet both data protection and compliance demands. Read More!

WHITE PAPER: Checkpoint Software

Point Abra: A Secure Virtual Workspace
Discover how you can turn any PC into your own corporate desktop with a fully encrypted USB stick. Read now!

Error Reporting Oops: Microsoft, Meter Maids and Malicious Code
Do you think hackers are dumb enough to send malicious code directly to Microsoft via Windows error reporting? Do you think Microsoft is foolish enough to flaunt scantily dressed women at a tech convention while celebrating women in IT? The answers are apparently yes to both, at least according to what happened Down Under last week. Read More

3M offers $943M for biometric security vendor Cogent Systems
3M has agreed to buy biometric access control systems vendor Cogent for around US$943 million in cash. Read More

NASA ice-watching satellite crashes into sea
NASA today said its Ice, Cloud, and land Elevation (ICESat) satellite splashed into the Barents Sea this morning ending a seven year mission to study the Earth's polar zones. Read More


WHITE PAPER: Websense

Seven Criteria for Evaluating SaaS
The right Security-as-a-Service solution can perform reliably and effectively and deliver the flexibility and control associated with on-premise solutions — at a significantly lower cost — without compromising privacy and security. Read More

RIM gets 60 days reprieve as India evaluates its proposals
Proposals from Research In Motion (RIM) for lawful access of its networks by law enforcement agencies in India are being put into operation immediately, the government said Monday. Read More

Security at the Little League World Series
The 2010 Little League World Series wrapped up yesterday in South Williamsport, Pennsylvania. The series, which is the world's largest youth sporting event, took place over nine days and saw 30 games played between the best teams in Little League baseball. On its final day, more than 29,000 fans turned out to watch a Japanese team defeat a team from Waipahu, Hawaii. It is the first time a Japanese team has taken the title in the event's history. Read More

Organizing sensitive data in the cloud
What does a cloud vendor do to properly segment various types of sensitive data within its cloud? Gregory Machler discusses how to capture the metadata you'll need. Read More


WHITE PAPER: MessageLabs

Gartner Magic Quadrant for Secure Email Gateway
This industry report covers the email gateway market. Gartner, Inc. positions Symantec Hosted Services in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention). Read the entire report. Read Now

Sources to protect you from the zero-day Windows DLL exploit
Even though Microsoft is so far refusing to patch the critical Windows DLL vulnerability that has become the source of an ever growing number of new exploits, you can protect your systems now. But it won't be easy.The fix involves manually auditing which applications are vulnerable and then applying Microsoft's new fix-it tool. Many makers of Windows software, such as Wireshark, are also promising... Read More

Old Apple QuickTime code puts IE users in harm's way
Apple's failure to clean up old code in QuickTime leaves people running Internet Explorer (IE) vulnerable to drive-by attacks, a Spanish security researcher said today. Read More

A good governance policy goes a long way
The recent newsletters about data governance (or lack of it) and data breaches brought in a bunch of e-mail from friends and other readers noting other problems that had cropped up around the world showing just how bad things are. Read More

Research experiment disrupts Internet, for some
An experiment run by Duke University and a European group responsible for managing Internet resources went wrong Friday, disrupting a small percentage of Internet traffic. Read More

Is it safe to use a SIP trunk as your outbound dialing option?
A recent product security announcement from Cisco (http://www.cisco.com/warp/public/707/cisco-sa-20100825-cucm.shtml) and a blog post by Chris Jackson (http://www.networkworld.com/community/node/65442) made me feel it may appear that SIP trunking is not secure enough as a PSTN (Public Switched Telephone Network) access method. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Cloud storage lives up to the hype
We tested five cloud-based storage services under real-world conditions. We set up accounts, connected with the vendor storage network, uploaded and downloaded files, measured performance and analyzed cost structures. Our conclusions are that cloud-based storage can save you money. And cloud-based storage can be fast. However, there are still security concerns that you need to be aware of.

Wireless networks and mobility quiz
iPhones and other handhelds bought for home use are infiltrating corporate networks, but there's a host of other wireless technologies that comprise a wave of mobile computing that is creating sweeping changes in business infrastructure. How well versed are you in the technical and not-so- technical details?

MOST-READ STORIES

  1. Air Force uses real birds of prey to protect its own predators
  2. Pentagon official details U.S military net hack
  3. Microsoft: 'We love open source'
  4. Apple in talks to bring $0.99 TV rentals to iTunes
  5. Social Security Administration to award massive network deal
  6. Windows and Linux servers grow at Unix's expense
  7. Security chiefs at home: No such thing as 'off duty'
  8. Report: Sun, Microsoft and Mozilla leave the most vulnerabilities unpatched
  9. Technology's Biggest Myths
  10. Geezer Quiz 2010
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: