Search This Blog

Friday, April 01, 2011

IBM: Mobile phone and cloud security issues can bite unwary IT departments

Tighter security available to .com sites, but upgrades required | To Whom Should The CISO Report?

Network World Security

Forward this to a Friend >>>


IBM: Mobile phone and cloud security issues can bite unwary IT departments
IBM says IT staff need to pay extra attention to use of mobile devices and cloud infrastructure on business networks because both technologies are still young, and security can be sketchy. Read More


WEBCAST: Dell

Security: A Multilayered Approach
The resources in this Security KnowledgeVault provide expert advice on everything from creating a multilayered security strategy and deploying a more proactive fight against cybercrime, to realizing when it's time to stop going it alone and seek outside, expert help. Learn more.

WHITE PAPER: Dell

Elements of a Proactive Data Security Solution
See all the survey results along with more data security resources, including an expert Webcast outlining six vital security steps, in the security KnowledgeVault. Learn more.

Tighter security available to .com sites, but upgrades required
VeriSign has added an extra layer of security to the Internet's .com domain, but e-retailers, banks and other Web site operators will need to upgrade their DNS hardware, software or services to take advantage of .com's new cryptographic features. Read More

To Whom Should The CISO Report?
I met with some security professional friends last night for ribs, beers, and lively security chatter. One of our discussion points was about the organizational position and role of the CISO. Read More

6 outrageous office pranks
Nothing livens up the work day or gets HR's attention better than a good old office prank. Here's a collection of some of the best, or worst, depending on your perspective. Read More


WHITE PAPER: Radware

Electronic ID Provider Buypass Goes Virtual with Radware
Buypass chose Radware's ADC-VX solution for its new virtualization capabilities to ensure performance predictability of its critical web applications, significant hardware savings, lower operational expenses and shorter deployment time for delivery of new applications and services to customers. Learn How

Robots dive deep underwater to solve airliner crash mystery
A small squadron of undersea robots has begun to conduct a 4 month,  3,900 square mile search of Atlantic Ocean bottom looking for the deep-sea wreck site of and black boxes from Air France Flight 447 which crashed off the coast of Brazil nearly two years ago. Read More

Failure to encrypt portable devices inexcusable, say analysts
The continuing failure by most enterprises to encrypt sensitive data stored on laptops and other mobile devices is inexcusable, analysts said following BP's disclosure this week of a data compromise involving a lost laptop. Read More

What a cyberwar with China might look like
If there is a cyberwar with China, as described in a new hypothetical scenario, it will not necessarily involve power grids being knocked offline and planes falling from the sky. Read More


WHITE PAPER: Siemens

The Business Value of Collaboration
It would be easy to assume that if you get your hands on voice, web and video conferencing technology, you've got a business collaboration solution. But the reality is not so simple. This paper discusses the proven business value of collaboration & social media and how to make them perform. Read Now

Man-in-the-Browser attacks target the enterprise
With firewalls, antivirus and other security mechanisms protecting corporate networks, how do attackers manage to penetrate enterprise computer systems? Simply by exploiting the weakest link in the security chain. One of the newest methods is tunnelling in via employees' browsers using an attack known as "Man-in-the-Browser" (MitB). Read More

Phishing attacks down dramatically in 2010, says IBM
The volume of phishing attacks dropped in 2010 to less than a quarter of what was seen in the previous two years, according to IBM's annual research report on threats and risks. There was still plenty of spam, however. Read More

Operation Phish Phry defendants found guilty
Five members of the online bank-theft gang caught by an international investigation called Operation Phish Phry face more than 30 years in prison in some case after being found guilty in federal court in Los Angeles. Read More

Samsung cleared of laptop keylogger accusation
Samsung Electronics' laptops do not contain a secret program that logs keystrokes, security researchers have found, chalking the problem up to a mistake by an antivirus program. Read More

VIPRE maker explains false positive on Samsung laptops, apologizes
The maker of the VIPRE anti-spyware tool is taking responsibility for a false positive that misidentified a legitimate Windows folder on Samsung laptops as a program that secretly logs keystrokes. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Tech's youngest billionaires
The nine youngest billionaires in technology run the gamut from a social networking entrepreneur to the creator of the online coupon company, groupon.com. Think you know them all? Let's find out.

No joy for would-be baby shakers and drunk drivers
In this slideshow we'll take a look at some of the most notorious applications that were banned or removed from the big-name app stores.

MOST-READ STORIES

  1. Samsung installs keylogger on its laptop computers
  2. Samsung responds to installation of keylogger on its laptops
  3. FBI wants public help solving encrypted notes
  4. Google building fiber network in Sprint's backyard
  5. Microsoft to raise license price, add software rights
  6. FTC puts Google on 20 years of 'privacy probation'
  7. Cisco data center revamp cuts across switches, servers, storage
  8. Hacker group defends exposing McAfee website vulnerabilities
  9. Dell draws derision for dissing iPad
  10. Microsoft researchers tout programmable prototype switch

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: