Search This Blog

Thursday, October 13, 2011

Microsoft Security Summary: Don't Sweat 0-days & Wise Up Stupid and Lazy Users!

The Apple security survival guide | Raytheon's cyberchief describes 'Come to Jesus' moment

Network World Security

Forward this to a Friend >>>


Microsoft Security Summary: Don't Sweat 0-days & Wise Up Stupid and Lazy Users!
After collecting data from over 600 million computers worldwide, Microsoft released the Microsoft Security Intelligence Report Volume 11 [PDF] which "exposes the threat landscape of exploits, vulnerabilities, and malware" during the first half of 2011. Read More


RESOURCE COMPLIMENTS OF: Sophos

Free Conficker Malware Removal Tool from Sophos
Conficker is still the most common piece of malware putting unpatched computers at risk. Detect and remove Conficker today!

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn More!

The Apple security survival guide
Attacks against the Mac are on the rise, and users need to know what they're up against to mount an effective defense. Here's a survival guide that will help. Read More

Raytheon's cyberchief describes 'Come to Jesus' moment
After Raytheon began selling missiles to Taiwan in 2006, the defense company's computer network came under a torrent of cyberattacks. Read More


WHITE PAPER: Trend Micro

Before Taking the Cloud Plunge
Security and privacy are critical concerns for those considering cloud adoption. The differences between SaaS, PaaS and IaaS are significant and require careful due diligence. This paper will help you do the homework necessary to compare security practices and determine which model is right for your organization. Read More

The SSL certificate industry can and should be replaced
The SSL certificate authorities like Comodo that have had their security undermined by hackers shouldn't be trusted, and in fact, the way the entire SSL certificate industry of today works can and should be replaced with something better, says Moxie Marlinspike, a security expert who's come up with a plan he says will do that. Read More

NASA's 7 wicked cool crop-circle corn mazes
NASA, seven space farms team to build out-of-this world corn mazes Read More


WHITE PAPER: Dell and Intel

Laying the Groundwork for Private and Public Clouds
Over the past two years, the concept of cloud computing has grabbed hold of the IT consciousness and stirred up the industry. But with so many vendors jumping into the cloud-computing fray, promising the world and then some, deciphering what's real and what's not can be difficult for even the most seasoned IT professionals. Read now.

Peer-to-peer update to Zeus Trojan confers resistance to take-downs
The Zeus financial malware has been updated with P-to-P (peer-to-peer) functionality that makes it much more resilient to take-down efforts and gives its controllers flexibility in how they run their fraud operations. Read More

NASA video game lets you build, run complex space network
NASA this week rolled out a video game that lets would-be network executives design and build a giant virtual ground and space communications system that would keep astronauts in orbit and scientists on the ground in touch. Read More



SLIDESHOWS

26 helpful open source network management tools
Over the last decade or so, open source development has skyrocketed, and network management software has ridden that wave. Many frustrated IT administrators have turned to free tools to monitor, configure and map their networked devices. Here are 26 examples of open source network management software tools to help you do your job.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. 2012 IT budgets, salaries on the rise, survey says
  2. FBI rolling out nationwide face search and recognition system
  3. Microsoft releases service packs galore
  4. 5 cloud security companies to watch
  5. Father of SSL says security linchpin has lots of life left
  6. Watch large hadron collider collisions with an Android app
  7. Computer infected? Blame yourself, Microsoft report concludes
  8. Cell phone subscriptions outnumber people in U.S.
  9. Microsoft launches Firefox, Chrome attack campaign
  10. More on the Cisco Nexus v2

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: