Search This Blog

Friday, October 07, 2011

Microsoft to fix 23 security holes in 8 patches on Tuesday

Feds want uber cybersecurity compliance standard | Oracle to pay US almost $200M to resolve false claims lawsuit

Network World Security

Forward this to a Friend >>>


Microsoft to fix 23 security holes in 8 patches on Tuesday
On Tuesday, Microsoft will release eight security bulletins, two rated critical and six rated important, to fix 23 vulnerabilities. These will fix holes in Internet Explorer, .NET Framework & Silverlight, Microsoft Windows, Microsoft Forefront UAG, and Microsoft Host Integration Server. The critical patches affects all supported versions of Windows: XP, Vista and Windows 7, Windows Server 2033, 2008... Read More


WHITE PAPER: Raritan

Best Practices: KVM Smart Card Authentication Systems
Selecting a smart card-enabled KVM system? Choose one that supports PKI authentication to multiple servers from a single location and makes the necessary KVM feature adjustments to enable seamless use of the reader. This White Paper examines best practices when evaluating a Smart Card solution. Learn More

WHITE PAPER: HP & Intel

Read now
HP's Converged Infrastructure incorporates tools that make remote support and management efficient and effective. HP Insight Control, for example, helps reduce server deployment time from four hours to just 20 minutes, a 12-fold decrease in deployment time. learn more

Feds want uber cybersecurity compliance standard
Tired of regulators from three or four federal agencies auditing your network security compliance every year? A congressional task force recommends a super-standard that would cut the number of annual audits back to just one. Read More

Oracle to pay US almost $200M to resolve false claims lawsuit
In what it says is the largest False Claims Act settlement it has ever collected, the US General Services Administration will get $199.5 million plus interest from Oracle for "failing to meet their contractual obligations." Read More


WHITE PAPER: Quest Software

New NetVault Backup Licensing Model
Read a report from an industry-leading analyst to see why traditional backup and recovery licensing methods no longer make sense. You'll learn how you can dramatically cut costs with a different strategy that's more intuitive, reasonable, enduring, and flexible. Download the report today. Read Now!

Pirate Bay website circumvents Belgian blocking
Following a court ruling last week ordering two Belgian Internet service providers to block access to the Pirate Bay website, the organization has set up a new domain name to help users get around the blockade. Read More

Which smartphone is the most secure?
These days, it is almost impossible to meet someone who doesn't own a cell phone. More specifically, smart phones, whether it be the trendy iPhone, corporate favored Blackberry or modern Windows Mobile, almost everyone has joined the smart phone frenzy -- and with good reason. A smart phone offers more advanced computing ability and connectivity than a contemporary phone. Read More


WHITE PAPER: HP & Intel

Strategy Guide to Converged Infrastructure in Retail
This strategy guide explains how, by using HP's Converged Infrastructure, you can upgrade technology, standardize equipment and improve IT practices, all of which can help reduce IT costs, cut network downtime, increase productivity and improve customer service. Read now

SpyEye steals banking codes by sending them to wrong phone
Researchers from browser security vendor Trusteer have identified a new variant of the SpyEye financial Trojan that tricks online banking users into changing the phone numbers associated with their accounts. Read More

US lawmakers question cloud security
A rush by President Barack Obama's administration to move U.S. government agencies to cloud computing services may lead to unintended security problems and other headaches, some lawmakers said Thursday. Read More

Android's big security flaw, and why only Google can fix it
Device makers and carriers let patches languish, so users may not ever get them -- a new approach is sorely needed Read More

Facebook alliance with Websense not enough, experts say
Facebook just got safer, according to a press release last week from the social networking giant and the Internet security firm Websense. Read More



SLIDESHOWS

26 helpful open source network management tools
Over the last decade or so, open source development has skyrocketed, and network management software has ridden that wave. Many frustrated IT administrators have turned to free tools to monitor, configure and map their networked devices. Here are 26 examples of open source network management software tools to help you do your job.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Steve Jobs narrates "Crazy ones" think different ad in never aired clip
  2. Apple Chairman Steve Jobs dead at 56
  3. Steve Jobs at Apple: In pictures
  4. Steve Jobs dies
  5. Huawei gunning for Cisco in the enterprise
  6. Steve Jobs: A timeline
  7. Can Hotmail revamp win back GMail defectors?
  8. Steve Jobs gave Barack Obama an iPad 2 "a little bit early"
  9. Steve Jobs and life in the shadow of death
  10. TechAmerica: U.S. IT industry adds jobs in 2011

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: