Monday, October 10, 2011

President Barack Obama order to bolster classified information security

Security roundup: Steve Jobs, Apple and IT security; DDoS attacks against VoIP; a hot week for SIEM | Monitoring and Dealing With Snort Alerts

Network World Security

Forward this to a Friend >>>


President Barack Obama order to bolster classified information security
In the wake of the WikiLeaks publishing of classified information in 2010 and other cybersecurity breaches, President Barack Obama today outlined a variety of new information security steps intended to prevent such disclosures in the future. Read More


WHITE PAPER: CA Technologies

Performance Metrics and the Cloud
Unlike static configuration management databases, which often contain information too outdated for real-time understanding, a dynamic operational service model provides relevant, timely information. Read More

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision Learn more!

Security roundup: Steve Jobs, Apple and IT security; DDoS attacks against VoIP; a hot week for SIEM
This week the respectful thoughts of many turned to Steve Jobs, the legendary co-founder of Apple, who passed away at the age of 56. When it comes to security, Apple computers were remarkable for the kinds of troubles they largely didn't have in comparison to Microsoft-based computers with their high rate of enterprise adoption that the Apple Macintosh never achieved. Microsoft operating systems and applications over time have been relentlessly targeted by attackers if only because Microsoft products constituted a large field of malware opportunity due to their huge market acceptance, plus the number of vulnerabilities discovered in them month after month. Read More

Monitoring and Dealing With Snort Alerts
Snort, the open source intrusion detection and prevention system, is immensely powerful, but to get the most out of it, you need to configure it correctly for your own setup. Here are some performance tips for dealing well with alerts, looking at alert monitoring, streamlining false positives and genuine but frequent real positives, and logical rule optimization. Read More


WHITE PAPER: Akamai Technologies, Inc.

Leveraging Cloud Security to Weather Threatening Storms
This paper assesses the current cyber threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern day IT threats. It takes a close look at DDoS defense in particular. Read now

Scammers waste no time in exploiting Steve Jobs's death
As much of the world mourns the passing of Steve Jobs -- one of the technology industry's greatest visionaries -- the bottom feeders of the cyber crime world are greedily exploiting the tragedy through scams promising unwitting users a chance to win a free iPad. Read More

Facebook API abuse can expose private user data, say hackers
Facebook is ignoring a serious shortcoming in the way it limits application developers' access to information about Facebook users, according to a pair of hackers. Read More


WHITE PAPER: Citrix

Best Practices for Implementing 2048-bit SSL
Ready for 2048-bit SSL? Not with F5. Shift to Citrix NetScaler. 2x faster 2048-bit SSL performance. Download the Citrix and Verisign 2048-bit Performance Kit. Learn more

Android malware downloads instructions from blog
Researchers from Trend Micro have spotted a piece of malicious software for Android that receives instructions from an encrypted blog, a new method of communication for mobile malware, according to the company. Read More

Survey shows shift to cloud-based services, despite concerns
A survey of 5,300 IT and security managers in 38 countries about cloud computing offers a vivid snapshot of expectations, anxieties and sometimes shattered hopes. Read More

PROTECT-IP or control freaks? Monster Cable blacklists Sears, Facebook as rogue sites
While PROTECT-IP attempts to address serious issues like online copyright enforcement and trademark infringement, the expansive way DNS server is defined as well as plans to block "rogue sites" could damage the free Internet or civil liberties. Rep. Read More

Privacy Nightmare: Data Mine & Analyze all College Students' Online Activities
It is not uncommon for schools to be equipped with metal detectors, cameras for video surveillance, motion detectors, RFID badge tracking, computer programs to check school visitors against sex offender lists, and infrared systems to track body heat after school hours and potentially hunt down intruders. No parent ever wants any possibility of a school tragedy, so other biometric systems in the name... Read More



SLIDESHOWS

26 helpful open source network management tools
Over the last decade or so, open source development has skyrocketed, and network management software has ridden that wave. Many frustrated IT administrators have turned to free tools to monitor, configure and map their networked devices. Here are 26 examples of open source network management software tools to help you do your job.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Steve Jobs narrates "Crazy ones" think different ad in never aired clip
  2. Oracle to pay U.S. almost $200 million to resolve false claims lawsuit
  3. Steve Jobs at Apple: In pictures
  4. Huawei gunning for Cisco in the enterprise
  5. Who's who in IPv6: The companies and people leading the way
  6. Can Hotmail revamp win back GMail defectors?
  7. Windows 8 means no more widgets or start menu
  8. Feds want uber cybersecurity compliance standard
  9. 'Incremental' iPhone 4S still promises to be big seller
  10. Steve Jobs told biographer he knew his time was short

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment