Search This Blog

Thursday, September 15, 2011

Homeland Security Digital Library – Priceless resource

  U.S. needs to be on-guard for a big cyber-attack | If You Use It, Mobile Malware Will Come
 
  Network World Security Strategies

Forward this to a Friend >>>


Homeland Security Digital Library – Priceless resource
The Naval Postgraduate School Center for Homeland Security and Defense (CHSD) is a world-standard institution in information assurance (IA) and homeland security (HS) education. Established in 2003 as a response to the horrific events of 9/11, the CHSD is also the home of a valuable resource for all IA and HS professionals: the Homeland Security Digital Library (HSDL). Read More


WEBCAST: Quest Software

Data Protection for Data Growth
Today's unprecedented growth in data - and the need to protect it - means you must find an effective, inexpensive to backup and potentially recover your company's data! In this Quest Software on-demand video, learn how to develop and manage a flexible backup and recovery strategy. Watch it today. View Now!

WHITE PAPER: ExtraHop

Application Performance Management
In this eGuide, Network World, with sister publication CIO, offer news on the latest trends, best practices, and straightforward advice on these solutions and the challenges of managing application performance. Learn More!

U.S. needs to be on-guard for a big cyber-attack
A destructive attack from cyberspace "is coming, in my opinion. It is a question of time. What we don't know is how far out it is," and whether it will target commercial infrastructure, government networks or mobile platforms Army Gen. Keith Alexander told attendees of the "Maneuvering in Cyberspace" symposium this week. Read More

If You Use It, Mobile Malware Will Come
No matter what mobile platform you choose, be it Android, iOS or BlackBerry, you run the risk of infection and data theft. Read More

Symantec cloud-based service seeks out 'rogue certificates'
Symantec this week introduced what it calls the Symantec Certificate Intelligence Center, a cloud-based service that works with an on-premises software component to keep track of SSL server certificates used by an organization. Read More

Measuring impact of Wi-Fi denial-of-service attacks
A research team at North Carolina State University has proposed a way of measuring the impact of wireless denial-of-service attacks on Wi-Fi networks. It's a step toward building focused counter-measures that can make such attacks costly to pull off. Read More


WHITE PAPER: ADTRAN

Socializing your UC Strategy
Beyond standard cost savings – minimizing a bit of travel or enabling you to consolidate some servers or voicemail systems – UC is really about improving productivity by stitching together various systems employees rely on. Learn more

US needs to kick network security intelligence up a notch
There is an urgent need for businesses and our government to develop high-level cyber-intelligence as a way to combat the unacceptable levels of online security threats because the current "patch and pray" system won't cut it in the future. Read More

Security pros come clean at Summit on Advanced Persistent Threats
Put about 100 chief information security officers, CIOs and CEOs into a room and what they are willing share about cybersecurity just might surprise you. More information about just what they shared will be revealed soon in a report stemming from a closed-door Summit on Advanced Persistent Threats held in Washington, D.C., in July, where business and government security professionals acknowledged to each other that their organizations had either been hacked through stealthy infiltration to steal valuable sensitive information and intellectual property, or that they wouldn't know it if it had been. Read More

With help from Intel, McAfee links security to the chip
Nearly seven months after Intel shelled out US$7.68 billion for antivirus vendor McAfee, the two companies are offering a glimpse of their future. Read More

US wants electronic cigarettes banned on aircraft
If you thought those electronic cigarettes which deliver nicotine in a vapor form might slide by on airlines, the US Department of Transportation has some bad news for you. It wants them banned. Read More


WHITE PAPER: Kaseya

How to Launch a Successful IT Automation Initiative
In this paper, we'll look at IT automation from the corporation's perspective, and discuss the steps organizations should take before launching such an initiative. We'll hear from companies that successfully implemented computer automation platforms, what their early steps were and what they would do differently if they could repeat the process. Read now

Banksy had it right: The future holds a mere 15 minutes of anonymity for everyone
All humans have a superpower. Now don't scoff and roll your eyes as your superpower is more like where you excel or are naturally gifted. For some people, it's organizing an event, raising money, cheering people up, "the gift of gab," etc. While nowhere as effective as Harry Potter's invisibility cape, some people who are concerned about privacy have the "superpower" of invisibility. Other folks post... Read More

SpyEye hacking kit adds Android infection to bag of tricks
The SpyEye hacking toolkit has added an Android component that collects the text messages some banks use as an extra security precaution, a researcher said today. Read More

DHS seeks to share top-secret info with banking and finance cybersecurity pros
The Department of Homeland Security works with financial institutions to thwart cyber attacks and plans to do so more and more in the future, according to DHS testimony to Congress, including sharing top secret cyber intelligence. Read More

PCI point-to-point encryption guidelines raise new questions
The PCI Security Standards Council today is expected to issue guidelines on use of point-to-point encryption in protecting sensitive payment card data, but the narrow approach — which is focused on hardware — is raising questions. Read More

 
 
 

SLIDESHOWS

Cloud companies to watch: A product sampler
Our Cloud Companies to Watch story gives you the lowdown on a handful of startups looking to make their mark in a business so far dominated by the likes of Amazon, Google, Rackspace and VMware. Here's a closer look at some of the products and services being rolled out by these newcomers.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. It's Programmer Day! ... (is that the best you can do?)
  2. Android texts take to traveling
  3. Cisco unveils routers, takes swipe at Juniper
  4. Cisco's new aggression
  5. Why FCoE is dead, but not buried yet
  6. Microsoft woos developers with Windows 8 demonstration
  7. Juniper follows Cisco with edge upgrade
  8. 7 hot cloud companies to watch
  9. iPhone 5 rumor rollup for the week ending Sept. 9
  10. Windows 8: A visual tour of what we now know
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: