Search This Blog

Monday, October 17, 2011

Security roundup for Oct. 14: BlackBerry blows up; the 'dual-persona' mobile device?; more on the RSA hack; Moxie's moxie on SSL certificates; Vint Cerf on Google's privacy policies

After Stuxnet, a rush to find bugs in industrial systems | Social Security agency leaks thousands of SSNs every year, report says

Network World Security

Forward this to a Friend >>>


Security roundup for Oct. 14: BlackBerry blows up; the 'dual-persona' mobile device?; more on the RSA hack; Moxie's moxie on SSL certificates; Vint Cerf on Google's privacy policies
Confidentiality, integrity and availability are oft-mentioned goals of security, and that being the case, this week's lack of service globally for the BlackBerry constitutes a profound security collapse. Read More


WHITE PAPER: IBM

Leveraging security from the Cloud
Cloud computing is a flexible, cost-effective and proven deliv-ery platform for providing business or consumer IT services over the Internet. This whitepaper discusses the who, what, when, why and how of cloud-based security services. Read Now

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn More!

After Stuxnet, a rush to find bugs in industrial systems
Kevin Finisterre isn't the type of person you expect to see in a nuclear power plant. With a beach ball-sized Afro, aviator sunglasses and a self-described "swagger," he looks more like Clarence Williams from the '70s TV show "The Mod Squad" than an electrical engineer. Read More

Social Security agency leaks thousands of SSNs every year, report says
The Social Security Administration puts thousands of Americans at risk of identity theft each year by accidentally leaking their Social Security Numbers and other data, according to an investigative report by the Scripps Howard New Service. Read More


WHITE PAPER: Sophos

The State of Data Security
In this report, you'll learn about what data you need to protect and why, what a data breach will cost your organization and strategies for safeguarding your data. Read now

PCI Should Focus on the Real Problem
I had a very enjoyable argument with my friend and colleague Nathan Clevenger at Interop on the subject of local apps vs. applications hosted in the cloud. Read More

Symantec details Android malware threats
Google Android is one of the top operating systems for smartphones with a 43% market share. No wonder cybercriminals are starting to pay attention. A new Symantec report outlines the potential threats and the various monetization techniques employed in Android-focused malware. Read More


WHITE PAPER: Trend Micro

Protect Virtual Desktops
Protecting virtual servers, virtual desktops and data stored in the cloud requires security optimized for the unique characteristics of these environments. See Tolly Enteprises' Independent performance tests comparing the performance of Trend Micro, McAfee, and Symantec. Read Now

SpyEye malware continues to plague computers
The SpyEye banking malware continues to plague computers across the world and is proving to be a difficult foe to detect and remove from infected Windows PCs, according to two researchers from EMC's RSA security division. Read More

Enterprises need to focus on data, enterprise culture
It's no secret that enterprise users are bringing more types of IT devices to work -- devices not necessarily condoned or managed by IT -- while they're also using more cloud-based services to store, manage and share their work related files. Read More



SLIDESHOWS

26 helpful open source network management tools
Over the last decade or so, open source development has skyrocketed, and network management software has ridden that wave. Many frustrated IT administrators have turned to free tools to monitor, configure and map their networked devices. Here are 26 examples of open source network management software tools to help you do your job.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Should tech pros get an MBA?
  2. 2011 tech industry graveyard
  3. Vint Cerf on Google's privacy practices
  4. Dennis Ritchie, father of Unix and C programming language, dead at 70
  5. Did FBI tail terror suspect using Wi-Fi called 'FBI Van 1'?
  6. Many users complain of broken iOS5 upgrade process
  7. 2012 IT budgets, salaries on the rise, survey says
  8. Oh Siri, you so silly!
  9. Of Cisco, Citrix, VMware and WAAS
  10. Computer infected? Blame yourself, Microsoft report concludes

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: