Search This Blog

Wednesday, March 09, 2011

US needs to get better at preventing foreign access to advanced technology

8 must-have Android security apps | Corporate data breach average cost hits $7.2 million

Network World Security

Forward this to a Friend >>>


US needs to get better at preventing foreign access to advanced technology
GAO watchdogs find holes in high-tech access, licensing rulesWhen it comes to protecting the US family jewels - high-tech data on everything from aeronautics, information systems and electronics to lasers and unmanned aerial vehicles --  parts of the government tasked with protecting those assets need to do a way better job. Read More


WHITE PAPER: Trend Micro

Trend Micro Deep Security 7.5
Servers and desktop virtualization are essential elements of any IT strategy that seeks to decrease capital and operations expenditures. Tests have shown that Trend Micro Deep Security consistently outperforms non VM-aware implementations. Learn more about Deep Security in this whitepaper. Read now!

WEBCAST: Juniper Networks

Securing the Next-generation Datacenter
For the security teams responsible for safeguarding corporate IT assets, these trends present a host of challenges, necessitating several new capabilities and approaches to ensure ongoing, effective security Learn more!

8 must-have Android security apps
While Android is a terrific operating system in many ways, it does pose some real risks for IT departments. Last week's revelation that Google had to remove around 50 malware-infected applications from its Android Market highlighted the downside of the company's "free love" approach to publishing applications where it will let anyone put their app on the market and will only take it down if alerted by a third-party user. The upside of this, of course, is that the market also offers a wide variety of quality security applications that can protect you from malicious apps. Here are eight Android applications that can help IT departments keep a better hold on employees' Android-based devices. Read More

Corporate data breach average cost hits $7.2 million
The cost of a data breach went up to $7.2 million last year up from $6.8 million in 2009 with the average cost per compromised record in 2010 reaching $214, up 5% from 2009. Read More

Cyberattack-alert system could be model for U.S.
An ambitious project to create a statewide cyber-alert "early warning" system in the state of Washington to link with the federal Dept. of Homeland Security (DHS) is starting to take shape and could be a cybersecurity monitoring model for other states. Read More


WHITE PAPER: CA

Adopt Cloud Computing while Maintaining Strong Security
Cloud security controls can often be implemented by extending existing enterprise systems and processes to the cloud. This paper discusses the approaches cloud service providers are currently deploying and the role identity and access management plays when adopting a strong cloud security strategy. Read Now

Researcher blows $15K by reporting bug to Google
A security researcher lost a sure $15,000 at this week's Pwn2Own hacking contest because he had earlier reported the bug to Google, which has patched the vulnerability in its Android Market. Read More

Researchers unmasking anonymous email senders
Just because you send an email anonymously doesn't mean people can't figure out who you are anymore. Read More

How Google and Android users can make secure mobile market
Android has a lot going for it, but as the last week has shown its approach to selling and distributing applications is going to need some improvement. Ever since launching Android in 2007, Google has gone out of its way to making the mobile operating system the most accessible and app-friendly in the industry.  Read More


WHITE PAPER: AccelOps

Putting the Top 10 SIEM Best Practices to Work
This e-book, provides guidance to operationalize security and put the top 10 best SIEM practices to work. Rather than an exhaustive examination of SIEM, it offers insightful details with regards to how IT organizations and information security professionals can gain more assured value from SIEM. Read now!

3 simple reasons VoIP abuse will grow
In its recent annual security report, Cisco predicted VOIP abuse as a potential area for cyber crime growth. Read More

Microsoft patches critical Windows drive-by bug
Microsoft today shipped three security updates that patched four vulnerabilities in Windows and Office, but did not patch IE ahead of the Pwn2Own hacking contest that begins Wednesday. Read More

Google issues last-minute Chrome fixes before Pwn2Own
Google patched 25 vulnerabilities in Chrome today in one last update before the Pwn2Own hacking contest starts Wednesday in Canada. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011.

Top 10 Chrome OS extensions
Though Google is pitching it as an operating system for netbooks and lightweight notebooks, Chrome OS is essentially the Chrome Web browser bolted on top of a bare minimum version of Linux. The following extensions can improve the user experience of Chrome (OS or browser) to give you some of the functionality found in a traditional operating system.

MOST-READ STORIES

  1. iPhone 5 to sport aluminum back, redesigned antenna, A5 chip
  2. Wells Fargo says no to personal smartphones and tablets
  3. Go for it on fourth down? Ask Coach Watson
  4. Perks drive up pay for tech CEOs
  5. Google throws 'kill switch' on Android phones
  6. IPv6 on home routers and DSL/cable modems: FAIL
  7. Is your company at risk of an IPv6 brain drain?
  8. The DDoS hall of shame
  9. Verizon: We have plenty of IPv4 addresses
  10. New security tools protect virtual machines

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: