Search This Blog

Thursday, November 18, 2010

Microsoft fixes security tool after Google reports Chrome problems

Microsoft gives free Symantec software in limited offer | Using stolen SSN isn't criminal impersonation, court says

Network World Security

Forward this to a Friend >>>


Microsoft fixes security tool after Google reports Chrome problems
Microsoft on Wednesday patched an enterprise security tool that had blocked some copies of Chrome from updating. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Quest Software

Combating Security and Compliance Challenges
Don't wait for a security breach or compliance issue to damage your company. Ongoing monitoring can proactively identify and reduce threats. Learn how you can successfully stop security issues before they become serious problems. Read More

Microsoft gives free Symantec software in limited offer
Microsoft is now offering free Symantec security software to small businesses for a limited time, through retailer PC Mall, following some grumbling in response to the free distribution of its own security software. Read More

Using stolen SSN isn't criminal impersonation, court says
Colorado justices play legal Twister to overturn conviction This head-scratcher happened a couple of weeks ago but hasn't gotten anywhere near the attention it deserves. Read More

Free? Radical!
Network World is on a mission, and the operative word is "free."Network World knows you're feeling the pinch in this tough economy. So we've been taking a closer look at the most useful stuff you can get for free. We started with 10 free Microsoft products for IT and home users. Then we moved to the cloud, where companies are increasingly just giving away storage space. Today, you can get 5 GB for free from SugarSync and others. Read More


WEBCAST: Websense, Inc.

Web Security Gateway Solutions Demo
This demo provides a hands on view of Websense Web Security Gateway solutions and how they enable safe productive use of today's dynamic, interactive Web. Learn More Now!

Leak sheds more light on Internet privacy proposals
A report being prepared for the White House calls on the Obama Administration to examine whether the Federal Trade Commission should be vested with new rulemaking authority on Internet privacy matters. Read More

Intrusion detection honeypots simplify network security
Low-cost, low-fuss honeypots are highly effective early-warning systems against external attacks and insider threats; KFSensor, HoneyPoint, and Honeyd offer safety, ease, and flexibility Read More

The Paranoid's Guide to Facebook
Over half a billion people use Facebook around the world. It is the single largest phenomenon of human connection in history, not to mention the biggest thing ever to hit the Web, and a source of enjoyment for millions. But it's becoming more and more of a love-hate relationship. We love using Facebook and other online social networks, but we hate the ever-increasing privacy and security concerns. Read More


WHITE PAPER: Watchguard

Unified Threat Management - Market Review
Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming. Read now!

Dell offering first encryption product
Dell Wednesday announced its first endpoint encryption product, along with the possibility of factory installation on certain Dell PCs. Read More

KFSensor: The sweetest honeypot
Longtime best-of-breed intrusion detection solution remains feature-rich, easy to use, and actively maintained Read More

Password cracking in the cloud
On-demand cloud computing is a wonderful tool for companies that need some computing capacity for a short time, but don't want to invest in fixed capital for long term. For the same reasons, cloud computing can be very useful to hackers -- a lot of hacking activities involve cracking passwords, keys or other forms of brute force that are computationally expensive but highly parallelizable. Read More

Report sounds alarm on China's rerouting of U.S. Internet traffic
A report submitted to Congress on Wednesday by the U.S.-China Economic and Security Review Commission expressed concerns over what the commission claims is China's growing ability to control and manipulate Internet traffic. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Microsoft Windows after 25 years: A visual history
More than nine out of 10 computers run some version of Windows. But no one could have predicted that would be the case when Windows 1.0 launched 25 years ago as a graphical front end for MS-DOS. Here's a look at Windows through the years and some thoughts on what the future might hold.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Google Chrome tops 'Dirty Dozen' vulnerable apps list
  2. Juniper buys WLAN pioneer Trapeze for $152 million
  3. Microsoft breaks petaflop barrier, loses Top 500 spot to Linux
  4. People who stand up for privacy could be classified as mentally ill
  5. Is free DNS a good deal for business?
  6. Juniper looks to one-up Cisco again in core routing
  7. Upgrade your Cisco cert to an HP cert
  8. Cloud storage free-for-all
  9. Microsoft Lync: What you need to know
  10. Chips in football helmets to monitor for concussions

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: