Search This Blog

Friday, July 01, 2011

Federal agency issues new security rules for financial institutions

The data breach quiz | Traditional host-based anti-virus software losing luster?

Network World Compliance

Forward this to a Friend >>>


Federal agency issues new security rules for financial institutions
The federal agency that regulates banks today issued new rules for online security for financial institutions, instructing them to use minimal types of "layered security" and fraud monitoring to better protect against cybercrime. Read More


RESOURCE COMPLIMENTS OF: CIO 100

Beyond the Big Idea: Executing on Innovation
Drawing on 10 years of research and diverse examples from companies such as Timberland and Harley-Davidson, Chris Trimble, Author and Professor, Dartmouth College will show you how to choose and build a great team through the innovation execution process, ultimately bringing your big ideas to their full potential. Join us at CIO 100, Aug 14-16, 2011. Register today!

WHITE PAPER: Raritan

Data Center Transformations
Build outs, consolidations and acquisitions are large-scale projects that can be very disruptive and require careful planning and implementation to maintain operations. This white paper examines the process and what's required to meet IT goals and objectives and maintain business continuity. Read now!

The data breach quiz
Find out how RSA, Sony, Citigroup, Anonymous and the U.S. Senate fit into this watershed year for data hacks Read More

Traditional host-based anti-virus software losing luster?
Traditional host-based anti-malware packages just aren't that useful anymore, according to some companies that find it either doesn't protect against the main dangers they face from the Web or it simply doesn't run well in virtualized computer environments. Read More

Inventor of SecurID token has new authentication system
The inventor of the two-factor authentication SecurID token says the latest technology he's come up with is better because it can be used with a voiceprint biometric, plus it can be deployed for purposes of secure authentication in mobile phones, payments and cloud computing. Read More

Google patches 7 bugs in Chrome browser
Google patched seven vulnerabilities in Chrome on Tuesday as it issued the second security update for its browser this month. Read More


WHITE PAPER: Extreme Networks

Networks in Motion
Download this whitepaper today and discover how you can cost-effectively optimize your network for the mobile demands of today's business. Examine how IT can provide: * Personalization and intelligence. * Ease of operation. * Seamless quality of user experience. * Secure on-the-go access to public and private networks. Read now!

LulzSec's parting Trojan is a false positive
The LulzSec hacking group sailed off into the sunset Saturday, leaving behind a treasure trove of stolen data along with what some antivirus programs identified as a nasty surprise for anyone who downloaded the Torrent file: a Trojan horse program. Read More

Hackers steal info on military, defense personnel
Email addresses and names of subscribers to DefenseNews, a highly-regarded website that covers national and international military and defense news, were accessed by hackers and presumed stolen. Read More

Man sentenced to 13 years in Operation 'Phish Phry'
A 27-year-old man has been sentenced to 13 years in prison for managing a phishing operation in conjunction with Egyptian hackers that looted consumer bank accounts. Read More

Symantec compares iOS and Android security
Apple's iOS and Google's Android smartphone platforms are more secure than traditional desktop-based operating systems, but are still susceptible to many existing categories of attacks, according toa 23-page report from security software vendor Symantec. Read More


WHITE PAPER: Riverbed

Case Study - Psomas
As a high-growth firm, Psomas needed to accelerate application performance to accommodate a changing set of demands from the business as well as employees. With Riverbed Steelhead products deployed worldwide, their employees can now share work and leverage resources wherever they happen to be. Read now!

Cellcrypt releases encrypted voice call app for the iPhone
Cellcrypt released a version of its voice encryption software for Apple's iPhone on Tuesday, adding to its portfolio of software to prevent eavesdropping on calls. Read More

Symantec finds big differences in iOS, Android security
Apple iOS and Google Android have some big differences when it comes to mobile security, creating distinct potential vulnerabilities for enterprises embracing devices running these operating systems, according to analysis by Symantec. Read More

Microsoft patents spy tech for Skype
A newly patented Microsoft technology called Legal Intercept would allow the company to secretly intercept, monitor and record Skype calls. Privacy advocates are concerned. Read More

Rootkit infection requires Windows reinstall, says Microsoft
Microsoft is telling Windows users that they'll have to reinstall the operating system if they get infected with a new rootkit that hides in the machine's boot sector. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

12 of the slickest designs in enterprise tech gear available today
Consumer devices tend to get all the praise for their designs, but there's plenty of cool equipment to be found in the enterprise market. When hardware vendors tag-team with renowned industrial designers, the results can be impressive. Here are some of our favorites.

MOST-READ STORIES

  1. Tablet deathmatch: HP TouchPad vs. Apple iPad2
  2. 10 compelling apps for Cisco Cius
  3. The best 2011 Windows 7 laptops for work and play
  4. Inventor of SecurID token has new authentication system
  5. IBM takes dim view of EU claims
  6. At $750, Cisco Cius Android tablet priced more than an iPad
  7. Apple offers refunds for unhappy Final Cut Pro X customers
  8. What Microsoft paid The Stones to help launch Windows 95
  9. 9 gigantic bonuses that make yours look like chump change
  10. Buying a Linux machine -- Where to shop?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: