Search This Blog

Monday, August 15, 2011

Who are you? Non? Anon?

Security rundown for week ending Aug. 12 | UAC May be a Nuisance but it Serves a Purpose

Network World Security

Forward this to a Friend >>>


Who are you? Non? Anon?
Gibbs ponders anonymity. At least, it might be Gibbs ... how would you know? Read More


WHITE PAPER: CenturyLink Business

Why IT Leaders Aren't Scared of Cloud Security
Examine this CIO report in which your peers offer advice on cloud services and data protection. Learn 3 key tips for taking the right approach to securing a hybrid cloud infrastructure to dispel any data doubts. Read now!

WHITE PAPER: Akamai Technologies, Inc.

Leveraging Cloud Security to Weather Threatening Storms
This paper assesses the current cyber threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern day IT threats. It takes a close look at DDoS defense in particular. Read now

Security rundown for week ending Aug. 12
Not unlike the week before, this past week saw hacking once again grab everyone's attention. This time it was an alleged threat from the shadowy group Anonymous to "kill" the social-networking site Facebook. The reason given? Anonymous supposedly thinks Facebook abuses people's privacy and cooperates with authoritarian governments. Read More

UAC May be a Nuisance but it Serves a Purpose
Microsoft introduced the despised User Account Control (UAC) feature in Windows Vista (and gave it a major overhaul for functionality in Windows 7) for a good reason. It was supposed to give users the power to control, monitor and protect their computer in the event of an attempted unauthorized change to their computer. Read More

Business Apps on the iPhone: Dos and Don'ts
Techies love features and functions; business users are more focused on simplicity and speed. CIOs must seek to balance both worlds when developing a business app for the iPhone. Read More


WHITE PAPER: GFI Software

Protecting Against the New Wave of Malware
Learn why traditional antivirus approaches don't work and why a new approach to endpoint security is required to better protect your company from malicious threats. Learn about the scope of the malware problem and strategies that can help you defend against evolving malware threats. Read now!

10 scariest hacks from Black Hat and Defcon
Researchers showed all manner of serious attacks on everything from browsers to automobiles. Read More

Wireless "tattoo" monitors your health and could become electronic bandage
Researchers are touting a wireless skin-thin, microelectronic tattoo as an alternative to hard-wired electrodes for healthcare tests or monitoring and ultimately new applications such as electronic bandages. Read More

USB devices: The big hole in network security
USB devices may be important tools foir business but they have security issues Read More


WHITE PAPER: Dell

IT Managers Face Security Challenges with Mobile Devices
A recent IDG survey reveals data security is the top barrier to supporting employees' mobile devices. Read more

I cannot sleep at night because I just got back from Black Hat
I've attended the Black Hat Security conference in Las Vegas for many, many years now. It is by far the best security event each year and this year was no exception. Each year seems to go something like this for me: Read More

5 reasons why SIEM is more important than ever
IT environments are growing ever more distributed, complex and difficult to manage, making the role of security information and event management (SIEM) technology more important than ever. Here's why. Read More

Firefox 8 to block unapproved add-ons
Starting with Firefox 8, Mozilla will automatically block browser add-ons installed by other software until users approve them, a company product manager announced yesterday. Read More

PCI group outlines technology to conceal sensitive account information
The Payment Card Industry Security Standards Council today published guidelines aimed at helping merchants and others processing payment cards make effective use of what's known as "tokenization" technologies to conceal sensitive account information. Read More

VMware preparing data loss prevention features for vShield
At the upcoming VMworld conference, VMware plans to highlight new data-loss prevention capabilities in an updated version of its virtual system security product, vShield. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

4 reasons Windows Phone 7 will eventually beat iPhone and Android
Here are four reasons why Microsoft will be a major smartphone player in a few years. And three reasons it won't.

MOST-READ STORIES

  1. IBM says PC going way of vacuum tube and typewriter
  2. Harvard class project compares smartphones usability
  3. Purdue's hefty switch discounts 'unusual,' Cisco says
  4. 10 scariest hacks from Black Hat and Defcon
  5. I cannot sleep at night because I just got back from Black Hat
  6. The epic unpopularity of Windows smartphones
  7. Did Google+ ban cleavage-snuggling LEGO stormtrooper?
  8. Microsoft makes more money on cloud-based Exchange than legacy email
  9. 4 reasons Windows Phone 7 will beat iPhone and Android
  10. Augmented reality research: 'Offline to online recognition'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: