Thursday, August 04, 2011

Corporate cybercrime costs skyrocket

US wants to build cybersecurity protection plan for cars | Spike in mobile malware doubles Android users' chances of infection

Network World Security

Forward this to a Friend >>>


Corporate cybercrime costs skyrocket
Security threats such as malware, insider attacks, phishing, botnets and a host of other problems are costing large corporations more money to handle. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Manage multiple computers with ease
Central's web-based management console lets you deploy software, proactively monitor and automate tasks. You can even apply all Windows Updates at the same time to keep systems up-to-date and secure. Try it free for 30 days.

WHITE PAPER: Fortinet

Keep Pace with New Security Threats
Resource-hungry security functions such as content-based inspection can slow system performance and decrease throughput, resulting in high network latency and traffic bottlenecks. Learn how hardware-accelerated unified threat management can process traffic at near line-rate network speeds while providing the highest level of security. Read More

US wants to build cybersecurity protection plan for cars
As cars and other forms of transportation increasingly rely on online systems for everything from safety to onboard entertainment, the cybersecurity threat from those who would exploit such electronic control packages has also Read More

Spike in mobile malware doubles Android users' chances of infection
An explosion in mobile malware during the last six months has more than doubled the chance that a user's Android smartphone will become infected, a security researcher said today. Read More

Firewall Administration Techniques and Tools
Firewalls can be difficult to manage. Often times rules lack granularity due to a lack of understanding of the application traffic or trying to keep up with the speed of business. Firewalls get more and more rules added to their policies to the point of becoming "Swiss cheese". Don't give up hope because there are methods and tools available to help you gain control of your firewall policies. Read... Read More


WHITE PAPER: Akamai Technologies, Inc.

Taming the Cloud
This whitepaper explores the components of the cloud computing ecosystem, demonstrates how Akamai is delivering services for cloud optimization, and looks forward into the evolution of this dynamic and growing market. Read now

Apple Gets Serious About iPad Security, Is It Enough?
Soon, SAP hopes to sew up a gaping security hole for its 7,000 iPad-toting employees. The Germany-based tech giant is beta testing a product that will allow it to send PGP-encrypted confidential email to employees. In turn, employees will be able to decrypt them using a Symantec viewer iPad app. Read More

ACLU wants details on mobile tracking by police
The ACLU has asked law enforcement agencies in 31 states to detail how they are using mobile phone location data. Read More

Mobile device security: Questions to ask for creating policy
While 69 percent of organizations have employees using personal devices to connect to their corporate network, more than one-fifth, or 21 percent, currently have no policy in place to govern the use of personal mobile devices on their network. These new figures, released recently from security-products firm Courion, suggest many security leaders are still ignoring the need to address mobile-device management among their employees. Read More


WHITE PAPER: Splunk

Autodesk Gains Visibility into MSP Metrics with Splunk
See how Splunk has become the tool that is allowing Autodesk to crack the MSP "black box" and measure critical metrics and SLA performance. Read more.

Take cyberthreats seriously, says counter-terrorism expert
Cofer Black warns that government officials shouldn't dismiss warnings of imminent cyberattacks. Read More

Google patches 30 Chrome bugs, adds Instant Pages
Google patched 30 vulnerabilities in Chrome today, paying out the third-highest bounty total ever for the bugs that outsiders filed with its security team. Read More

Microsoft incorrectly claims drop in vulnerabilities that allow remote code execution
In its latest annual security report, Microsoft claimed some progress in fending off vulnerabilities that allow remote code execution, but the initial version of the report released Monday contained errors, and a corrected version released today no longer claims that the total number of vulnerabilities allowing remote code execution is dropping. Read More

Cisco: Malware almost triples in Q2
The rate of unique instances of malware almost tripled in the second quarter, from 105,536 unique instances in March 2011 to 287,298 in June, Cisco found in its most recent Global Threat Report. Companies with 5,001 to 10,000 employees and companies with more than 25,000 employees experienced significantly higher malware encounters compared to other size segments, on an encounter-per-seat basis. Read... Read More

Check Point Aims Wide and High
In July, Check Point Software beat Wall Street estimates when the company posted over $300 million in revenue, up 15% from 2Q 2010. Check Point also reported that product and software licensing revenue is up 15% from a year ago. Why is Check Point growing? Check Point firewalls have always held a very valuable piece of network real estate, separating corporate networks from a crime infested community... Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Chromebooks you can buy now
Here's a roundup of computing devices that run Chrome OS, a few which you can buy now, or which may be on the way.

MOST-READ STORIES

  1. 5 surprising IT skills that hiring managers want now
  2. Android Trojan records phone calls
  3. DARPA software to spin 'dumb' photos or video into intelligence gold
  4. Apple iPad 3 prototypes everywhere
  5. Why Wi-Fi as we know it is in trouble
  6. System links your face to your Social Security number
  7. Check Point has sights set on 1Tbps firewall
  8. 10 technologies that will change the world in the next 10 years
  9. HP extends Cisco switch trade-in program
  10. Google, data centers using less power than expected

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment