Search This Blog

Wednesday, December 01, 2010

Microsoft Security Essentials 1.0

AT&T goes after copper wire thieves | Critical Infrastructure Organizations Want Cyber Security Help From the Government

Network World Security

Forward this to a Friend >>>


Microsoft Security Essentials 1.0
When we looked at the beta of Microsoft Security Essentials in 2009, we were impressed with its clean, easy-to-use interface, but less so with its sluggish scan speed. This still holds true for Microsoft Security Essentials 1.0; also, it hasn't kept pace with newer antivirus products when it comes to detecting malware. Read More


E-BOOK: Palo Alto Networks

Get the "Next-Generation Firewalls for Dummies" Book
This book provides an overview of next-gen firewalls. Get your copy to find out: How Enterprise 2.0 applications create new risks for your organization? Why traditional firewalls can't protect your network? How next-generation firewalls stand apart from other security solutions? Click to continue

WHITE PAPER: Watchguard

10 questions to ask before you buy an anti‐spam solution
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

AT&T goes after copper wire thieves
Copper thefts on rise as value increasesCopper thieves targeting Atlanta are now being targeted themselves by AT&T which is now offering $3,000 for information leading to their arrest. Read More

Critical Infrastructure Organizations Want Cyber Security Help From the Government
Nearly three-quarters of ESG survey respondents want more federal cyber security activityESG Recently Published a new Research Report titled, "Cyber Supply Chain Security Vulnerabilities Within The U.S. Critical Infrastructure." The report can be downloaded from the ESG web site: http://www.enterprisestrategygroup.com Read More

Stuxnet researchers cautious about Iran's admission of centrifuge issues
Iran on Monday apparently confirmed that the Stuxnet worm disrupted the country's uranium enrichment efforts, but one of the researchers who has dug deepest into the malware wasn't ready to call it a done deal. Read More


WHITE PAPER: IBM

Forrester – Your Enterprise Database Security Strategy 2010
Enterprises must establish a database security strategy that goes beyond authentication, authorization and access control. The key to successful database security is knowing why you're protecting each database, which databases to protect, and how best to secure data against all types of threats. Read now

WikiLeaks cables show US ignored Brown's NASA hacker pleas
Cables from the US Department of State that were recently made available on WikiLeaks have revealed how Gordon Brown pleaded with the US to stop the extradition NASA hacker Gary McKinnon. Read More

Groups vow to fight gov't takedowns of websites
The EFF and a website owner vow to fight domain name seizures by two U.S. government agencies trying to fight copyright infringement. Read More

Helping employees get corporate security policy
Employee awareness of their companies' security policies is high--if you ask the employees. In a survey of 2,000 office workers, software security company Clearswift found almost three quarters, 74 percent, felt 'confident' that they understand their employers' Internet security policies. That is, policy designed to safeguard data and IT security, as well as maintain productivity. But the confidence is misplaced, Clearswift suggests in their summary of the findings, because a third of those surveyed have not received any training on IT security since joining their firm. And more than two thirds of those who have not had recent training joined their organization more than five years ago--a 'technological lifetime,' notes Clearswift. Read More


WEBCAST: Netop

Best Practices for Remote Support
Join this live Webcast December 7th at 1 PM ET to hear practical advice on deploying remote support without putting your organization at risk. You'll learn how companies from regulated industries are implementing remote support and since this event is live, you'll have a chance to ask the experts your specific questions. Join us for this Live Event

ISPs sign up en masse for botnet industry code: IIA
Internet service providers (ISPs) representing some 80 per cent of the Australian market have signed on to the Internet Industry Alliance's (IIA) iCode, set to officially launch this week, according to the industry body's chief executive, Peter Coroneos. Read More

Fortinet unveils high-speed security blade for Fortigate-5000 chassis
Fortinet today introduced a high-speed security blade that combines a slew of capabilities -- including firewall, VPN, intrusion prevention, identity-based application controls, anti-virus, anti-spam and Web filtering -- and delivers up to 40G bit/sec throughput. Read More

Worthwhile Cloud Computing Security Resources for CIOs
I recently participated in a Cloud Innovation Council CIO roundtable discussion focused on cloud computing in the insurance industry. As expected, the CIOs said that they were concerned about cloud computing security in areas like identity management, data security and network security. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

December goodies from the Subnets
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Five reasons to be grumpy about 2010
  2. EFF backs red-faced porn watchers vs. copyright trolls
  3. Best networking tweaks for Linux
  4. 10 weirdest celebrity tech ads
  5. Help those with personal cyberstalking terrorists
  6. Inside the labs at Microsoft, HP and IBM
  7. WikiLeaks: China was behind Google hack
  8. Comcast outage encourages DIY DNS fix for some
  9. 10 things we love about Lync 2010
  10. Report says Apple iPad 2 to have two cameras, USB port

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: