Search This Blog

Wednesday, March 09, 2011

What is privacy, really?

US needs to get better at preventing foreign access to advanced technology | Microsoft warns of Windows Media video attacks on Patch Tuesday

Network World Security: Identity Management

Forward this to a Friend >>>


What is privacy, really?
Last issue we examined anonymity in the context of identity issue discussions. Over and over again people confuse anonymity with privacy. As we concluded in that discussion, anonymity means that no one knows who performs a certain activity. Privacy is far different. Read More


WHITE PAPER: Polycom

Enhance Communication with Polycom CX5000
Read how international law firm Perkins Coie was able to integrate the Polycom CX5000 Unified Conferencing station for Microsoft Live Meeting. The organization was able to enhance communication and collaboration among the firm's 700 attorneys resulting in better client service. Read More

WHITE PAPER: PacketMotion

PacketMotion and Sox IT Controls
PacketMotion's PacketSentry solution for User Activity Management and how it allows companies to comply with SOX quickly, efficiently, and without risking application availability. Read now!

US needs to get better at preventing foreign access to advanced technology
GAO watchdogs find holes in high-tech access, licensing rulesWhen it comes to protecting the US family jewels - high-tech data on everything from aeronautics, information systems and electronics to lasers and unmanned aerial vehicles -- parts of the government tasked with protecting those assets need to do a way better job. Read More

Microsoft warns of Windows Media video attacks on Patch Tuesday
Hackers could use malicious video files to take over Windows computersMicrosoft issued three security patches for Windows and Office today, including a critical bug fix for Windows Media Player and Windows Media Center. The Windows Media flaw, if left unpatched, lets attackers target victims with malicious video files. The malicious files can't automatically take over a victim's computer, so the hacker must perform some social engineering to trick the user. Read More

Researcher blows $15K by reporting bug to Google
A security researcher lost a sure $15,000 at this week's Pwn2Own hacking contest because he had earlier reported the bug to Google, which has patched the vulnerability in its Android Market. Read More

Are IT Vendors Getting A "Free Pass" On Security?
Technology industry won't emphasize security until there is a market or regulatory pushI gave a presentation on cyber supply chain security at a Mitre Software Assurance conference last week. One of the things I highlighted was that many organizations are not doing an adequate level of security due diligence on their IT vendors. This fact is clearly illustrated in a few ESG Research data points from the recent report, "Assessing Cyber Supply Chain Security Vulnerabilities Within the... Read More

Real ID: DHS National ID Nightmare that Won't Die?
The Real ID deadline was extended to Jan. 15, 2013. Real ID, which would turn your drivers license into a national ID, is like a DHS nightmare that just won't go away.The Real ID Act was signed in 2005 as part of President Bush's "war on terror." Supposedly it would enhance security and create a certified federal identity which every American would need before being allowed to fly, before entering government buildings, before entering national parks, before opening a bank account, and possibly being extended into many other areas like showing it before prescription... Read More


WHITE PAPER: Dell

How to Choose a Qualified Security Assessor
The selection of a Quality Security Assessor (QSA) will have a long and lasting impact on security and compliance for companies subject to PCI DSS compliance. This paper highlights guidelines for choosing a QSA firm in light of new regulations and refinements of PCI DSS v2.0. Learn more.

FTC: ID theft again tops consumer complaints
ID theft tops the list of consumer complaints made to the U.S. FTC and its partners in 2010. Read More

VMware aims give users more control with vCenter Operations
VMware is integrating performance, capacity and configuration management with the launch of vCenter Operations, in an effort to give users more control over growing virtualized IT infrastructures, the company said on Tuesday. Read More

8 must-have Android security apps
While Android is a terrific operating system in many ways, it does pose some real risks for IT departments. Last week's revelation that Google had to remove around 50 malware-infected applications from its Android Market highlighted the downside of the company's "free love" approach to publishing applications where it will let anyone put their app on the market and will only take it down if alerted by a third-party user. The upside of this, of course, is that the market also offers a wide variety of quality security applications that can protect you from malicious apps. Here are eight Android applications that can help IT departments keep a better hold on employees' Android-based devices. Read More

Corporate data breach average cost hits $7.2 million
The cost of a data breach went up to $7.2 million last year up from $6.8 million in 2009 with the average cost per compromised record in 2010 reaching $214, up 5% from 2009. Read More

Cyberattack-alert system could be model for U.S.
An ambitious project to create a statewide cyber-alert "early warning" system in the state of Washington to link with the federal Dept. of Homeland Security (DHS) is starting to take shape and could be a cybersecurity monitoring model for other states. Read More


WHITE PAPER: PC Mall

Securing Virtualized Data Centers
Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions. Read Now

How Google and Android users can make secure mobile market
Android has a lot going for it, but as the last week has shown its approach to selling and distributing applications is going to need some improvement. Ever since launching Android in 2007, Google has gone out of its way to making the mobile operating system the most accessible and app-friendly in the industry. Read More

3 simple reasons VoIP abuse will grow
In its recent annual security report, Cisco predicted VOIP abuse as a potential area for cyber crime growth. Read More

Researchers unmasking anonymous email senders
Just because you send an email anonymously doesn't mean people can't figure out who you are anymore. Read More

New security tools protect virtual machines
As enterprises move towards virtualizing more of their servers and data center infrastructure, the security technologies that are plentiful and commonplace in the physical world become few and far between. Read More

Microsoft patches critical Windows drive-by bug
Microsoft today shipped three security updates that patched four vulnerabilities in Windows and Office, but did not patch IE ahead of the Pwn2Own hacking contest that begins Wednesday. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011.

Top 10 Chrome OS extensions
Though Google is pitching it as an operating system for netbooks and lightweight notebooks, Chrome OS is essentially the Chrome Web browser bolted on top of a bare minimum version of Linux. The following extensions can improve the user experience of Chrome (OS or browser) to give you some of the functionality found in a traditional operating system.

MOST-READ STORIES

  1. iPhone 5 to sport aluminum back, redesigned antenna, A5 chip
  2. Wells Fargo says no to personal smartphones and tablets
  3. Go for it on fourth down? Ask Coach Watson
  4. Perks drive up pay for tech CEOs
  5. Google throws 'kill switch' on Android phones
  6. IPv6 on home routers and DSL/cable modems: FAIL
  7. Is your company at risk of an IPv6 brain drain?
  8. The DDoS hall of shame
  9. Verizon: We have plenty of IPv4 addresses
  10. New security tools protect virtual machines

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: