Search This Blog

Wednesday, February 16, 2011

Tablets, smartphones force Cisco to rethink how security works

Stolen US military IDs ideal cover for army of online dating scammers | Should you worry about rogue wireless network access points?

Network World Security

Forward this to a Friend >>>


Tablets, smartphones force Cisco to rethink how security works
Cisco has unveiled a self-described "complicated" security architecture dubbed SecureX that it says provides a context-aware way to safeguard networks increasingly overrun with smartphones, tablets and virtualization. Read More


WEBCAST: Palo Alto Networks

Choosing Enterprise Firewall for 2011 & Beyond
Firewalls are evolving. Application visibility and control has made its way to the forefront of the requirements list for enterprise firewalls. We are dedicating this episode of 60 Minutes with Nir Zuk to the more practical considerations around choosing an enterprise firewall. Learn more!

WHITE PAPER: AccelOps

Putting the Top 10 SIEM Best Practices to Work
This e-book, provides guidance to operationalize security and put the top 10 best SIEM practices to work. Rather than an exhaustive examination of SIEM, it offers insightful details with regards to how IT organizations and information security professionals can gain more assured value from SIEM. Read now!

Stolen US military IDs ideal cover for army of online dating scammers
Fraudsters use stolen military IDs, online dating services to steal moneyIt's a new twist on an old scam. The Army Times newspaper today details the growing trend of fraudsters stealing the identities of US Army soldiers from social network sites and then using that information to set up false profiles on Internet dating sites. The profiles are uses to dupe prospective dates out of their money.  But there are other consequences too.  Read More

Should you worry about rogue wireless network access points?
The subject of rogue access points (RAPs) has been on our minds lately, and in our ongoing 2011-2012 benchmark interviews we have been asking folks about their experiences with them. Read More

Symantec looks to protect users from mutating malware
Symantec today announced the 12th edition of its flagship enterprise desktop anti-malware product, Symantec Endpoint Protection, that looks to go beyond traditional anti-virus signatures to use a cloud-based file-identification system to protect users from virus mutations. Read More

Hot products from RSA 2011
Security conference showcases the next trends in network security. Read More


WHITE PAPER: VeriSign

DNSSEC: What It Is, and Isn't
As hackers continue to exploit Internet vulnerabilities, efforts are underway to protect individuals and companies against these exploits. Discover how the rollout of Domain Name System Security Extensions ensures adequate protection, and what benefits individuals and companies can expect from this initiative. Read Now

Obama seeks big boost in cybersecurity spending
The White House is proposing a big increase in cybersecurity research and development in next years budget to improve, in part, its ability to reduce the risk of insider threats and ensure the safety of control systems, such as those used at power plants. Read More

BSidesSF and cloud security: Move past fear, get to work
David Mortman of Securosis says much of what has been said about cloud security has ranged from the misguided to outright FUD. Read More

A Quest for secure authentication
Some companies like to partner with IdM vendors either on specific projects or for strategic solutions. Some companies like to acquire IdM vendors to either round out their product offering or to provide specific tools to solve a specific need for their customers. And some companies do both. Read More

5 ways to make sure you aren't the next Wikileak
Here are five key tips to help your government agency or enterprise avoid being the source of the next Wikileak. Read More


DOWNLOAD: Qualys Inc.

QualysGuard Security & Compliance Suite Trial
The 14-day Trial includes: • Unlimited network mapping and discovery • Unlimited network perimeter scans • PCI Compliance scanning • Web application security scanning • IT security policy creation, scanning and reporting Sign up for your free trial today! Learn more!

7 Precautions to Take Before Your Phone is Lost or Stolen
Few things hurt more than losing your mobile phone. Read More

Digital Signage: Privacy in a One-Way Mirror Society
How smart and interactive will digital signage become before there is a great public outcry about privacy invasion?Digital signage is getting smarter, more interactive, and the ads with eyes come in many attention-snagging varieties. It's a big booming business to use digital signage to expand upon consumer interaction via RFID-enabled smart shelves and smart carts, video walls, interactive kiosks, shopping mall maps, vending machines with facial recognition software, and even digital signage that interacts with... Read More

Virtualization can be key to cloud security, RSA chief says
In a keynote address at the RSA Security Conference here, RSA chief Art Coviello struck an optimistic tone about the future of security in cloud computing environments. Read More

Oracle Database Firewall defuses SQL injection attacks
Oracle is using the RSA Conference this week to launch a database firewall designed to block suspicious traffic. Read More

Lenovo security updates can put missing ThinkPad, ThinkCentre PCs on lockdown
Lenovo announced at the RSA Conference Monday that its ThinkPad laptops and ThinkCentre desktops now support anti-theft and encryption capabilities aimed at minimizing the chance of data falling into the wrong hands when computers are lost or stolen. Read More

Stuxnet scored quick hit on first target, says researcher
Stuxnet infected its first target just 12 hours after hackers finished the worm, an indication that the malware scored an almost instant bulls-eye, a Symantec researcher said today. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

15 more useful Cisco sites
Three years ago, we compiled our initial list of 20 useful sites for Cisco practitioners, partisans and pundits. Now we're adding to that list with 15 more sites we found useful for the Cisco masses.

A sneak-peek preview of Android 3.0
Expect a new holographic look, customizable home screens, a Windows-style taskbar, and tabbed browsing in Google's upcoming version of the Android OS, code-named Honeycomb.

MOST-READ STORIES

  1. Geekiest marriage proposals of all time
  2. Are the iPad 2 HD rumors for real?
  3. FCoE: From fee to free
  4. IBM's Watson surges to Jeopardy lead, retains tie against humans
  5. Microsoft certifications won't boost your pay much
  6. 'Laptop is dead,' proclaims MDM company
  7. Tablets, smartphones force Cisco to rethink how security works
  8. iPads storm the enterprise
  9. Five iPad safety tips
  10. J.C. Penney caught gaming Google

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: