Search This Blog

Tuesday, November 09, 2010

Danger to IE users climbs as hacker kit adds exploit

US wants upper hand in battling high-tech bad guys | It's Time For A New Name for Data Loss Prevention (DLP)

Network World Security

Forward this to a Friend >>>


Danger to IE users climbs as hacker kit adds exploit
Microsoft will likely issue an emergency kit to an unpatched IE flaw after it was added to the Eleonore crimeware kit. Read More


WHITE PAPER: Emerson Network Power

Data Center Infrastructure Design and Management
Does efficiency have to come at the expense of availability? Not according to this paper, which outlines the four data center infrastructure trends that are reducing design, operating and management costs while improving data center performance. Those trends are Infrastructure Management, Eco Availability, Flex Capacity and High Density. Learn more

WHITE PAPER: Iron Mountain

How to Reduce Your Backup Burden
Discover the top 10 reasons businesses are turning to data protection solutions that combine the latest advancements in disk-based backup with secure, integrated online technologies offer the fast, assured data recovery. Read now

US wants upper hand in battling high-tech bad guys
4G cell phone, cloud computing, VoIP forensics target of US Department of Justice call for actionThe US Department of Justice this week said it was looking to boost the research and development of technology that could significantly bolster new forensic tools for digital evidence gathering. Read More

It's Time For A New Name for Data Loss Prevention (DLP)
Myopic industry-driven title has become obsoleteBack around 2005, DLP was the buzz term Du Jour within the information security industry. DLP was designed to find sensitive data and make sure that this data wasn't accidentally or maliciously mis-used. The most common DLP implementation was as a network gateway for filtering Layer 7 content. When a DLP devices spotted credit card numbers in an email, it simply blocked this transmission thus preventing... Read More


WEBCAST: Websense, Inc.

Securing the Social Web
Organizations around the world are racing to take advantage of social networking and media like Facebook, LinkedIn, and YouTube. Along with these new resources, comes new risk as user-generated content circumvents traditional security technologies such as antivirus and URL filtering. View Now

Top 10 network vulnerabilities inside the network
Today's state-of-the-art network security appliances do a great job of keeping the cyber monsters from invading your business. But what do you do when the monster is actually inside the security perimeter? Unfortunately, all of the crosses, garlic, wooden stakes and silver bullets in the world have little effect on today's most nefarious cyber creatures. Here are the top 10 ways your network can be attacked from inside and what you can do to insure your business never has to perform an exorcism on your servers. Read More

Election unlikely to slow U.S. cybersecurity efforts
Security experts expect the divided congress to remain mostly bipartisan on efforts to enact cybersecurity and online privacy measures. Read More


WHITE PAPER: Websense, Inc.

Bailing Out Your Budget: How to Lower Your TCO
The Websense® TRITON™ solution is a unified content security solution that not only delivers better protection against modern threats but also does so with the lowest total cost of ownership (TCO). Read More

Cisco VP talks of data center strategy
Cisco Vice President of IT John Manville discusses the company's data center makeover strategy, the migration to the company's own Unified Computing System, the benefits of cloud and the new IT organizational structure with Network World Editor in Chief John Dix. Read More

IT pros, workers show a 'disconnect' over mobile devices and policies
Two-thirds of workers in a survey for Cisco said their companies need to improve IT policies; at the same time, 20% of IT professionals said their relationship with employees is "strained and dysfunctional." Read More

Palin e-mail snoop doesn't belong in prison
Now that Election Day is behind us, judgment day nears for David Kernell, the 22-year-old son of a Tennessee politician who was convicted earlier this year of prying into Sarah Palin's personal e-mail account two months before the 2008 presidential election. Read More

Using logs for forensics after a data breach
Despite the best precautions, it is impossible to protect your network against every attack. When the inevitable happens, your log data can be critical for identifying the cause of the breach and collecting evidence for use in the legal system. That is, if your logs were properly configured before the breach happened. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

The Google Android Quiz
Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies
Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.

MOST-READ STORIES

  1. Hackers break Microsoft's Kinect security
  2. Windows 1.0 turning 25: First experiences recalled
  3. Microsoft Windows after 25 years: A visual history
  4. U.S. wants upper hand in battling high-tech bad guys
  5. Cisco bets state-of-the-art data center on UCS
  6. President Obama: offshoring fears are outdated, unwarranted
  7. Microsoft crafts shrewd apps plan for Windows Phone 7 launch
  8. All Windows 7 customers should consider desktop virtualization
  9. IT's biggest money wasters
  10. VoIP services losing ground

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: