Wednesday, July 06, 2011

Malicious activity alert: Anonymous hack-school grads come online in 30 days

EU upset by Microsoft warning about US access to EU cloud | US intelligence agency wants technology to predict the future from public events

Network World Security

Forward this to a Friend >>>


Malicious activity alert: Anonymous hack-school grads come online in 30 days
In about a month the first graduates of the new Anonymous hacking school could start having an impact on the frequency of cybercrime. Read More


WHITE PAPER: IBM

Managing Data and Application Security Risks
This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit Read Now

WHITE PAPER: EMC

The Mandate for Converged Infrastructure Management
Converged infrastructure is changing the way data centers roll out infrastructure resources and providing a clear and achievable path to cloud computing environments. Effective management of infrastructure is a key capability that can significantly impact the degree of success for data centers going the converged route. Read more

EU upset by Microsoft warning about US access to EU cloud
Members of the European Parliament have demanded to know what lawmakers intend to do about the conflict between the European Union's Data Protection Directive and the United State's Patriot Act. Read More

US intelligence agency wants technology to predict the future from public events
Publically available data that could be aggregated and used by intelligent systems to predict future events is out there, if you can harness the technology to utilize it. That's one of the driving ideas behind a program that the Intelligence Advanced Research Projects Activity (IARPA) group will detail at a Proposer's Day conference in Washington, DC next month. Read More

Private industry group leaps into the cybercrime fight
A consortium of eight companies launched a campaign on Tuesday to provide better training for law enforcement agencies in order to tackle cybercrime, which costs the U.K. economy tens of billions of pounds annually. Read More


WHITE PAPER: Raritan

Best Practices: KVM Smart Card Authentication Systems
Selecting a smart card-enabled KVM system? Choose one that supports PKI authentication to multiple servers from a single location and makes the necessary KVM feature adjustments to enable seamless use of the reader. This White Paper examines best practices when evaluating a Smart Card solution. Learn More

IPv6 Deployment Misperception: Private IPv4 Address Space and NAT are all I need
Over the last 9+ years of doing enterprise IPv6 deployments with customers I have gathered up a list of common misperceptions that the industry, media, vendors and customers have regarding IPv6 deployment in the enterprise. This series of blog posts will focus on the Top 5 misperceptions. Like any good "Top X" list, we start at the bottom. The No. Read More

Bad IT management habits: Break them before they break you
Every worker develops a few bad habits -- maybe more than a few -- as the years on the job add up. IT pros are no exception: They lose focus or jump to conclusions or put off niggling tasks that could be finished in minutes. Read More

Mobile payments, PCI DSS compliance: Some clarity
Those hoping for mobile payments PCI compliance answers will have to wait a bit longer, the security council says. Read More


WHITE PAPER: CA Technologies

Exceptional Application Experience
To improve and ensure the performance and availability of business-critical web applications, organizations need to be able to see and understand the actual user experience. This paper examines the five essentials of application performance monitoring. Learn More

Sniffing open WiFi may be wiretapping judge tells Google
Looks like Google Street View cars may have been "officially" riding dirty and Google may get slapped hard for its Wi-Spy fiasco. A federal judge did not dismiss the case against Google; instead in the first such decision of its kind, the judge ruled that sniffing open Wi-Fi packets might violate the Federal Wiretap Act. Read More

Microsoft to retire Office XP, Vista SP1 next week
Microsoft is set to retire 2001's Office XP and the first service pack for Windows Vista next week. Read More

Securing Data on All Devices
Scenario: Protecting sensitive data on mobile devices Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

Five potential Facebook killers
The social networking scene is constantly in flux. Facebook is at the top of the heap right now, but challengers are springing up all the time, hoping to leverage the next big wave into a lucrative IPO. Here are five social media sites that are creating a buzz.

MOST-READ STORIES

  1. 5 hot social networking sites
  2. New York Times has a lot of angry iPad subscribers after latest gaffe
  3. Cisco Cius is not a tablet
  4. Is the operating system dead?
  5. A few suggestions for destroying the 'indestructible' botnet
  6. What's so cool about SIP?
  7. HP plans major enterprise push for TouchPad
  8. IBM takes dim view of EU claims
  9. NYC mayor demands $600M refund on software project
  10. Google Chrome hits 20% global share as Microsoft continues browser slide

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment