Search This Blog

Thursday, October 13, 2011

Father of SSL says despite attacks, the security linchpin has lots of life left

Microsoft pans Chrome, Firefox security | Sony suspends 93,000 online accounts after illicit logins

Network World Security

Forward this to a Friend >>>


Father of SSL says despite attacks, the security linchpin has lots of life left
SSL/TLS, the protocol that protects security of e-commerce, has taken a beating lately, with news items ranging from the violation of certificate authorities to the discovery of an exploit that beats the protocol itself. Read More


WHITE PAPER: Sophos

Seven Tips for Securing Mobile Workers
Seven Tips for Securing Mobile Workers is intended to offer practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. Read now

WHITE PAPER: PhoneFactor

Phones Become the Leading Multi-Factor Authentication Device
According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Read now

Microsoft pans Chrome, Firefox security
Microsoft today launched a website that cranks out security scores for the various editions of its own Internet Explorer (IE) as well as browsers built by rivals Google and Mozilla. Read More

Sony suspends 93,000 online accounts after illicit logins
Sony has suspended 93,000 user accounts on several of its gaming and entertainment networks after unauthorized login attempts on those accounts, it said Wednesday. Read More

Survey finds dangerous gap in prevention
It's no big secret: contemporary attacks are levied over the Web; attackers will craft custom malware to slither past anti-malware defenses; and any business on any given day can be compromised. That's the reality of where information security stands today. Read More


WEBCAST: Quest Software

Data Protection for Data Growth
Today's unprecedented growth in data - and the need to protect it - means you must find an effective, inexpensive to backup and potentially recover your company's data! In this Quest Software on-demand video, learn how to develop and manage a flexible backup and recovery strategy. Watch it today. View Now!

Android peer-to-peer developer settles privacy flap with FTC
In an agreement announced today with the Federal Trade Commission, peer-to-peer file-sharing developer Frostwire can no longer use default settings that share consumers' files, provide a free upgrade its software to correct unintended sharing and bars the firm from misrepresenting what files its applications will share. Read More

Parting Thoughts: The world of security has turned on its head
For the past several years, I have had the honor of writing for Network World in "Risk and Reward." Unfortunately, that time has come to an end as I am leaving the world of independent analysts to pursue new adventures. In my last column, I'd like to explore some of my recurring themes and offer some predictions for the future. Read More

Fearing damage, Microsoft moved data after Japan earthquake
Microsoft undertook a sizable data migration project following Japan's earthquake in March, fearing that one of its data centers could become dysfunctional because of aftershocks. Read More


WHITE PAPER: HP & Intel

Read now
HP's Converged Infrastructure incorporates tools that make remote support and management efficient and effective. HP Insight Control, for example, helps reduce server deployment time from four hours to just 20 minutes, a 12-fold decrease in deployment time. learn more

Study: Many websites 'leaking' personal info to other firms
Many top websites share their visitors' names, usernames or other personal information with their partners without telling users and, in some cases, without knowing they're doing it, according to a new study from Stanford University. Read More

Cellphones will become a way to attack otherwise protected devices: report
Mobile phones will become an increasing menace to network security that could drop malware onto protected devices when they dock to sync or plug into USB ports to charge, security experts say in a Georgia Tech report. Read More

Computer infected? Blame yourself, Microsoft report concludes
Zero-day exploits are nerve-racking for IT professionals but are far less dangerous than unpatched older vulnerabilities for which fixes are available, Microsoft says. Read More

Security on a shoestring budget
According to figures released recently by Kaspersky Lab, 1300 IT pros were asked about IT risks and security spending. Among large companies, the average security budget is $3.35 million, according to Kaspersky's data. Read More

RSA chief says two groups for SecurID breach
Six weeks after EMC's RSA security division saw its SecurID system hit by hackers, RSA president Tom Heiser met with the CIO of a large global medical device company. Read More



SLIDESHOWS

26 helpful open source network management tools
Over the last decade or so, open source development has skyrocketed, and network management software has ridden that wave. Many frustrated IT administrators have turned to free tools to monitor, configure and map their networked devices. Here are 26 examples of open source network management software tools to help you do your job.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. 2012 IT budgets, salaries on the rise, survey says
  2. FBI rolling out nationwide face search and recognition system
  3. Microsoft releases service packs galore
  4. 5 cloud security companies to watch
  5. Father of SSL says security linchpin has lots of life left
  6. Watch large hadron collider collisions with an Android app
  7. Computer infected? Blame yourself, Microsoft report concludes
  8. Cell phone subscriptions outnumber people in U.S.
  9. Microsoft launches Firefox, Chrome attack campaign
  10. More on the Cisco Nexus v2

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: