Search This Blog

Friday, January 07, 2011

Moving to a next-generation firewall; Worst security disasters of 2010

Worst security disasters of 2010 | 2011 tech priorities: Are you ready to shake things up?

Network World Compliance

Forward this to a Friend >>>


2011 tech priorities: Moving to a next-generation firewall
What should enterprises expect if they want to make the transition from a traditional firewall to a next-generation firewall? It starts with a decidedly different way of thinking about security goals. Read More


DOWNLOAD: Qualys Inc.

QualysGuard Security & Compliance Suite Trial
The 14-day Trial includes: • Unlimited network mapping and discovery • Unlimited network perimeter scans • PCI Compliance scanning • Web application security scanning • IT security policy creation, scanning and reporting Download this free trial today! Learn more!

WHITE PAPER: HP TippingPoint

Securing Virtualized Data Centers
Learn how HP TippingPoint's secure virtualization framework addresses the unique requirements of virtualized data center environments. Learn More

Worst security disasters of 2010
This was the year 'security' morphed into the more serious-sounding 'cybersecurity'. Or, to put it less portentously, the US military and Government had a real shocker. Read More

2011 tech priorities: Are you ready to shake things up?
Concerns about the economy haven't evaporated, but companies aren't standing still waiting for a bailout. They're working to find new opportunities for growth. We've identified six key areas where IT can help reshape the business and equip employees to do their jobs more efficiently and effectively. Read More

Alleged Miley Cyrus hacker arrested
The 21-year-old hacker who boasted about breaking into Miley Cyrus' Gmail account and posting racy photographs of the teenage star has been arrested in Tennessee on fraud charges. Read More

Incident response plans badly lacking, experts say
The Gawker Media breach goes to show that the time to put a security incident response plan in place isn't in the heat of the action. Read More

Kneber botnet strikes again, targets gov't agencies
A botnet fingered for stealing a treasure trove of information last year has struck again, harvesting sensitive documents from dozens of government agencies and contractors, according to security experts. Read More


WHITE PAPER: Watchguard

Unified Threat Management - Market Review
Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming. Read now!

Good times projected for network security market in 2011
There's some early optimism about the information technology industry as the world steps into 2011. For one thing, the global network security market is expected to be on the rise, according to estimates from IDC, which forecasts a return to the growth of pre-recession levels this year. Read More

Geinimi Android malware has 'botnet-like' capabilities
Lookout Mobile Security warned that it identified a new Android Trojan named Geinimi that is built to lift and transmit personal data from a user's phone and ship it to a remote server. Read More

2011 Outlook: Better than 2010 and really wild
With more optimism combined with scary security %^$#, 2011 could be a wild ride Read More

Dell to acquire SecureWorks
Computer giant adds to security portfolio with SaaS provider. Read More

Worm Planted in Fake Microsoft Security Update
It's Tuesday, time for more security patches from Microsoft right? Not quite. It seems the malware crowd is exploiting Microsoft's routine of releasing fixes on Tuesdays and sending out fake security emails bent on infecting their targets with a worm. Read More


WHITE PAPER: Blue Coat Systems

Delivering Faster Applications to Any User, Anywhere
This guide looks at the specific issues behind application performance problems and how to resolve them within a WAN Optimization environment. Read More

Microsoft, Googler tussle over bug timeline
Microsoft and a Google security engineer are sparring over a bug the researcher reported to Microsoft last July. Read More

PHP floating point bug fix due within hours
A bug in the PHP scripting language leaves Web servers with large floating point numbers open to DOS attacks Read More

Self-Encrypted Drives Set to Become Standard Fare
We've seen this coming over time: Based on the Trusted Computing Group's standard, hard drives and solid state drives (SSD), are offering self-encryption built-in. The key difference with these next-generation encrypted drives is that these units have the encryption integrated into a single chip on drive in the drive. Read More

Sourcefire acquires Immunet for cloud-based anti-malware
With the $21 million acquisition of Immunet, Sourcefire becomes more of a full-service security firm, competing more directly with traditional anti-malware vendors Symantec, McAfee and others. Read More

FBI raids ISP in Anonymous DDoS investigation
Authorities in the U.S. and Germany have raided Internet Service Providers in hopes of tracking down the hackers who launched distributed denial of service (DDoS) attacks against Web sites such as Visa.com, PayPal.com, and Mastercard.com earlier this month. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

The weirdest, wackiest and stupidest sci/tech stories of 2010
It's hard to pick the weirdest and wackiest tech stories of 2010 considering there is so much nuttiness to choose from. But we'll give it a shot. Here we take a look at a number of stories that gave us pause in 2010.

2010's most popular iPad apps
As the iPad celebrates its first birthday, it should raise a glass to Apple's App Store, which has provided users with an array of innovative applications. Late last week, Apple released a list of the 10 most popular iPad applications, with productivity apps making up the bulk.

MOST-READ STORIES

  1. Cisco unveils Internet TV and more at CES
  2. Microsoft bashes Apple while previewing next-gen Windows
  3. 30 most anticipated tech products of 2011
  4. CES 2011: Gadgets galore
  5. AT&T LTE service to launch by midyear
  6. At CES, Lenovo marries Windows and Android
  7. What it's like to make the wrong job switch
  8. Worm planted in fake Microsoft security update
  9. Top 12 tech embarrassments of 2010
  10. Motorola rolls out Droid Bionic

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: