Search This Blog

Wednesday, August 04, 2010

Who really sets global cybersecurity standards?

  Microsoft says patch clients first, then servers | JailbreakMe Exploits Serious iPhone Security Flaw
 
  Network World Security

Forward this to a Friend >>>


Who really sets global cybersecurity standards?
Herding wild cats may be easier than settling issues or making over-arching decisions that affect international cybersecurity. Read More


E-GUIDE: Force10 Networks Inc.

Examining Nuances of the Cloud
Choosing the best cloud strategy means understanding the promises and pitfalls of each approach. This Network World eGuide provides expert articles on the nuances between different cloud strategies, best practices on building a hybrid cloud and making sure you have an exit strategy in case the cloud does not work out. Read More Now

WHITE PAPER: Websense

Seven Criteria for Evaluating SaaS
The right Security-as-a-Service solution can perform reliably and effectively and deliver the flexibility and control associated with on-premise solutions — at a significantly lower cost — without compromising privacy and security. Read More

Microsoft says patch clients first, then servers
Microsoft issued a high-priority fix to a critical Windows vulnerability today that should be applied to both clients and servers, but said that if you're short on time, apply the patch to the clients first. Read More

JailbreakMe Exploits Serious iPhone Security Flaw
JailbreakMe makes the process of jailbreaking the Apple iPhone much simpler and less intimidating. Just visit a Web site on the iPhone, and voila! Jailbroken iPhone. Think about that for a minute, though. The simple act of visiting a Web site is able to fundamentally alter the core functionality of iOS. Read More


WHITE PAPER: Insight

Examine Open Storage v. Proprietary Disk Systems
Download this whitepaper today and examine how Oracle's Sun Storage 7000 Unified Storage Systems offer a complete, open and integrated solution that: * Reduces time to deployment. * Lowers risk. * Simplifies storage deployment and management. Read now!

Softer data-leak prevention
Data-leak prevention is growing at 10% a year, a bit slower than anticipated but still pretty fast compared to other security technologies. In this year's research we see DLP use or active evaluation among 36% of research participants. The primary driver is compliance, as with most security funding. In looking at DLP deployment over time we noticed something very interesting: quite a few companies that deployed DLP last year pulled back on their deployments because of a backlash from users and management. Read More

B is for Botnets
Today Our Cool Tools Blogger Keith Shaw launched a new video series, "The ABCs of IT." It stars I.T. Jinglehopper (but Keith says you can call him Neal for short) and his sidekick/intern Jackson. The two will explain the alphabet of IT terms and hopefully provide some entertainment along the way. Read More


WHITE PAPER: MessageLabs

The Wild, Wild Web: How to Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

Software shouldn't fail
Software should work: it shouldn't fail. There are horrible stories on software failures [MK adds that the RISKS FORUM DIGEST is full of those stories] and many don't get publicity. Read More

Apple's iOS devices meet many enterprise security needs
Apple's iOS has reached the point where iPhones and iPads can be safely deployed for most enterprises, according to a new report from Forrester Research. Read More

Secretive group seeks recruits, finds skepticism
A secretive volunteer group that tries to track terrorists and criminals on the Internet went to the Defcon hacker conference this past week in hopes of recruiting information security experts, but it will first have to overcome some skepticism. Read More

MIT students helped suspect sneak classified docs to WikiLeaks, report says
Two MIT students may have helped WikiLeaks suspect Bradley Manning spirit classified information out of military databases, according to CNN. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Nine real iPad alternatives
Even since Apple released its "magical and revolutionary" iPad, other vendors have been scrambling to deliver products that go Apple one better. Here are nine that are expected to hit the stores this year.

Defcon badge is unlike anything you have ever seen
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a look at this year's badge.

MOST-READ STORIES

  1. Nine real iPad alternatives
  2. Apple's iOS devices meet many enterprise security needs
  3. New Linux kernel borrows Google packet speeding tech
  4. iPhone apps that could save your life
  5. Hacker snoops on GSM cell phones in demo
  6. Microsoft patches dangerous Windows flaw
  7. Microsoft says patch clients first, then servers
  8. WPA2 vulnerability found
  9. 7 IT career rules worth breaking
  10. Microsoft: VMware customers are 'Windows customers first'

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: