Search This Blog

Wednesday, September 14, 2011

With help from Intel, McAfee links security to the chip

Security pros come clean at Summit on Advanced Persistent Threats | Consumer devices create security, management headaches for IT

Network World Security

Forward this to a Friend >>>


With help from Intel, McAfee links security to the chip
Nearly seven months after Intel shelled out US$7.68 billion for antivirus vendor McAfee, the two companies are offering a glimpse of their future. Read More


WHITE PAPER: GFI Software

Messaging and Web Security Best Practices for 2011
In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years. Read More

WHITE PAPER: VeriSign

Approaches to DDoS Protection - A Cost Analysis
All organizations with an online presence or dependence on Internet-based systems need to fortify their defenses against DDoS attacks. Read this paper to learn what an attack can cost an organization, how to develop a DDoS mitigation strategy, and how to get maximum protection from your investment. Read Now!

Security pros come clean at Summit on Advanced Persistent Threats
Put about 100 chief information security officers, CIOs and CEOs into a room and what they are willing share about cybersecurity just might surprise you. More information about just what they shared will be revealed soon in a report stemming from a closed-door Summit on Advanced Persistent Threats held in Washington, D.C., in July, where business and government security professionals acknowledged to each other that their organizations had either been hacked through stealthy infiltration to steal valuable sensitive information and intellectual property, or that they wouldn't know it if it had been. Read More

Consumer devices create security, management headaches for IT
It seems the debate about whether or not employees will be allowed to use personal devices for work purposes is over; the practice is already rampant, according to new research. In a survey of 741 IT professionals, 87% said the employees at their companies are using personal devices for work purposes. But that doesn't mean IT is happy about it. Among survey respondents, 82% said they're concerned about... Read More


WHITE PAPER: Akamai Technologies, Inc.

Leveraging Cloud Security to Weather Threatening Storms
This paper assesses the current cyber threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern day IT threats. It takes a close look at DDoS defense in particular. Read now

The Game of Clue, Linux Edition: Who Hacked Linux.Com:
By now you have probably heard that most of the Linux Foundation's websites including Linux.com and Linux.org are down, the victims of a hack. It seems that a breach of Kernel.org a few weeks ago may have given the hackers a way in. The folks at the Linux Foundation became aware of a potential security issue on September 8th. In fact if you try to reach the site you will see the following: Read... Read More

SAP adds security, management for app stores
SAP customers looking to open iTunes-like enterprise app stores through Apple's Volume Purchase Program (VPP) will soon have the ability to manage and deploy the software securely thanks to new VPP support in the Sybase Afaria platform, SAP said Tuesday at the Tech Ed conference in Las Vegas. Read More


WHITE PAPER: Citrix Systems

Data Security via Desktop Virtualization
By centralizing virtual desktops and data, companies can protect sensitive information while giving users more flexibility and choice. Read More

US needs to kick network security intelligence up a notch
There is an urgent need for businesses and our government to develop high-level cyber-intelligence as a way to combat the unacceptable levels of online security threats because the current "patch and pray" system won't cut it in the future. Read More

SpyEye hacking kit adds Android infection to bag of tricks
The SpyEye hacking toolkit has added an Android component that collects the text messages some banks use as an extra security precaution, a researcher said today. Read More

Facebook Pwn tool takes profile info, helps social engineers
A group of security researchers based in Egypt have created a tool that will make social engineering easier because it automates the collection of hidden Facebook profile data that is otherwise only accessible to friends in a user's network. Read More

Vending machine company announces major data breach
A company that supplies vending machines and games to entertainment venues has disclosed a data breach affecting about 40,000 people who visited waterpark resorts in Wisconsin and Tennessee between December 2008 and May 2011 Read More



SLIDESHOWS

Cloud companies to watch: A product sampler
Our Cloud Companies to Watch story gives you the lowdown on a handful of startups looking to make their mark in a business so far dominated by the likes of Amazon, Google, Rackspace and VMware. Here's a closer look at some of the products and services being rolled out by these newcomers.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. Cisco unveils routers, takes swipe at Juniper
  2. You might be a terrorist if you take a photo at Mall of America
  3. 7 hot cloud companies to watch
  4. iPhone 5 rumor rollup for the week ending Sept. 9
  5. Inside Cisco's global security operations
  6. Cisco's new aggression
  7. Want a job? These 10 tech firms are hiring
  8. HP introduces new enterprise security software
  9. Windows 8: A visual tour of what we now know
  10. 2010's IT companies to watch: Where are they now?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: