Search This Blog

Wednesday, October 05, 2011

Battling botnet blight: It's going to take a big village

In face of massive cybersecurity threat, government security dawdles | Massive DDoS attacks a growing threat to VoIP services

Network World Security

Forward this to a Friend >>>


Battling botnet blight: It's going to take a big village
Botnets are indeed one of the scourges of the Internet and the government in conjunction with public and private companies want to work together to wipe them out. The US departments of Commerce and Homeland Security (DHS) today discussed with other federal agencies and information technology-based private-sector leaders the need to create what they called a "a voluntary industry code of conduct to... Read More


WHITE PAPER: Hitachi Data Systems

Storage Economics eGuide
You'll learn about the benefits other customers have realized from using HDS storage solutions and Storage Economics methodology. Read more

WHITE PAPER: IBM

B2B Automation Savings Calculator
The B2B Automation Savings Calculator demonstrates potential savings associated with automating manual processes and is based on your inputs as well as industry averages compiled by analysts and Sterling Commerce, an IBM company. Click Here!

In face of massive cybersecurity threat, government security dawdles
At a time when the cyberthreat level is at its peak, many federal agencies continue to struggle with IT security. Read More

Massive DDoS attacks a growing threat to VoIP services
When the massive distributed denial-of-service (DDoS) attack in March brought down the voice-over-IP (VoIP) call processing supplied by TelePacific Communications to thousands of its customers, it marked a turning point for the local-exchange services provider in its thinking about security. Read More

McAfee Acquires Nitro Security
I heard through the security industry grapevine that McAfee was close to buying ArcSight a few years ago but the board was reluctant to do another multi-hundred million dollar acquisition so the company passed. Clearly, McAfee knew it needed security management to round out its portfolio so it was only a matter of time until it pulled the trigger. Fast forward to October 2011. At the start of National... Read More


WEBCAST: VeriSign

Webcast: 5 Best Practices for DDoS Mitigation
Examine DDoS mitigation challenges, why traditional tactics aren't enough, and go inside the 5 keys you must implement in order to minimize the impact of an attack. View now!

Malicious cybersecurity assaults increased 650% in past five years, Feds say
Cybercriminals and other villains intent on stealing all manner of personal and government data are bombarding federal government agencies. Read More

iPad Data LP: Security Savior or Strong-Arm Tactic
Symantec unveiled its Data Loss Prevention for Tablets today, which forces Internet traffic on an iPad through a virtual private network and inspects outgoing traffic. It's good security, but does it defeat the purpose of owning an iPad to begin with? Read More

XSS web attacks could live forever, researcher warns
Websites that accidentally distribute rogue code could find it harder to undo the damage if attackers exploit widespread browser support for HTML5 local storage and an increasing tendency for heavy users of Web apps never to close their browser. Read More


WHITE PAPER: Raritan

Best Practices: KVM Smart Card Authentication Systems
Selecting a smart card-enabled KVM system? Choose one that supports PKI authentication to multiple servers from a single location and makes the necessary KVM feature adjustments to enable seamless use of the reader. This White Paper examines best practices when evaluating a Smart Card solution. Learn More

U.S., Russia slowly improve cybersecurity cooperation
Lingering distrust between the U.S., Russia and China has hampered cooperation in the past on cyber security issues, but relations are taking a turn for the better, with increasing contact between experts. Read More

'Well organized, sophisticated, fast' cybercriminals scare US banks
BITS, the U.S. financial industry's IT policy arm, has a new leader: Paul Smocer, an expert in email security and authentication. Read More

Symantec makes cloud-based security service available for corporate trials
Symantec today said its new cloud-based single sign-on (SSO) service called O3 is available to enterprise customers to test. Read More

Webroot moves to cloud-based malware detection
Webroot has revamped its antivirus product line, moving to a cloud-based system that it says is better suited to detect the deluge of malicious software circulating on the Internet. Read More

Fail a security audit already -- it's good for you
Failing an audit sounds like the last thing any company wants to happen. But that's because audits are seen by many as the goal of a security program. In reality, audits are only the means of testing whether enforcement of security matches the policies. In the broader context, though, an audit is a means to avoid a breach by learning the lesson in a "friendly" exercise rather than in the real world. If the audit is a stress-test of your environment that helps you find the weaknesses before a real attack, you should be failing audit every now and then. After all, if you're not failing any audits there are two possible explanations: Read More



SLIDESHOWS

26 helpful open source network management tools
Over the last decade or so, open source development has skyrocketed, and network management software has ridden that wave. Many frustrated IT administrators have turned to free tools to monitor, configure and map their networked devices. Here are 26 examples of open source network management software tools to help you do your job.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Steve Jobs gave Barack Obama an iPad 2 "a little bit early"
  2. What to expect when Apple finally 'talks iPhone' Tuesday
  3. iPhone 5 launch day rumor roundup
  4. The future of malware
  5. Juniper unveils cloud-based lab for customer testing
  6. Microsoft kills Google Chrome with bad malware signature
  7. Cisco loses out as Brocade wins healthcare software company business
  8. Data mine and analyze all college students' online activities
  9. Top 9 Firefox fixes
  10. Tech debate: Is a tablet a PC?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: