Search This Blog

Friday, November 11, 2011

DARPA to detail program that radically alters security authentication techniques

Gartner: Security services spending to hit $49B in 2015 | Secret Snoop Conference for Gov't Spying: Go Stealth, Hit a Hundred Thousand Targets

Network World Security

Forward this to a Friend >>>


DARPA to detail program that radically alters security authentication techniques
Researchers from the Defense Advanced Research Projects Agency will next week detail a new program it hopes will develop technology to dramatically change computer system security authorization. Read More


RESOURCE COMPLIMENTS OF: CIO Perspective

Balancing Business Needs with the Chaos of Mobile Security
At CIO Perspectives Los Angeles learn how to create a mobile security strategy that skips the technical jargon, communicates more effectively on risk profiles and focuses on what matters most to the business. An expert CSO will walk you through the layered security model that solves the problem. Register Today!

WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

Gartner: Security services spending to hit $49B in 2015
Gartner is predicting that corporate spending across the world for a broad swath of security services will climb from about $35 billion today to $49 billion in three years, with the managed security services expected to jump most of all. Read More

Secret Snoop Conference for Gov't Spying: Go Stealth, Hit a Hundred Thousand Targets
Forget passive monitoring for government spying; go stealth to hit your target says the Hacking Team which sells hacking techniques and tools for invasive surveillance of the masses. Better yet, hit a hundred thousand targets. We looked at legal means, with a Trojan horse warrant for remote computer searches. But what about those areas of mass surveillance without a warrant that seem shaded grey and... Read More


WHITE PAPER: i365

Trusted Data Assurance in the Cloud
Cloud-based services are here to stay. Cloud services are even more attractive for companies who are being hit with the high cost of meeting compliance requirements - especially for small and mid-size companies that have shrinking or no information security budget. Read now!

Open-source toolkit tracks down Duqu infections
The lab credited with discovering the Duqu malware has built an open-source toolkit that administrators can use to see whether their networks are infected. Read More

Forrester to security pros: Think before rushing to fix security holes
Forrester Research this week published a report that advises security professionals not to jump the gun on fixing security deficiencies immediately after a data breach is identified since that could destroy valuable evidence needed to prosecute cyber-criminals. Read More


WHITE PAPER: ExtraHop

Application Performance Management
In this eGuide, Network World, with sister publication CIO, offer news on the latest trends, best practices, and straightforward advice on these solutions and the challenges of managing application performance. Learn More!

4th Amendment vs Virtual Force by Feds, Trojan Horse Warrants for Remote Searches?
If you missed part one, Fourth Amendment's Future if Gov't Uses Virtual Force and Trojan Horse Warrants, then please go catch up with the rest of us. This time we'll look at Remote Access Trojans (RAT) which are nothing new, yet assume that this government-injected malware/spyware was not detected by antivirus. Also in this case, we are not assuming the target is a SE (social engineering) victim who... Read More

Understand mobile security in seven stories or less (a survival guide)
A collection of articles to help you understand the mobile threat and plan your security program accordingly. Read More



SLIDESHOWS

Wi-Fi security do's and don'ts
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. FBI takes out $14 million DNS malware operation
  2. Fabric wars: Cisco vs. Brocade vs. Juniper
  3. Adobe's decision to ditch mobile Flash: What you need to know
  4. Gartner: The top 10 strategic technology trends of 2012
  5. Juniper at the root of Internet outage?
  6. Meme-mania: The Musical, plus this week's other geekiest videos
  7. Microsoft isn't Apple: Redmond OKs Windows Phone 7 jailbreak tool
  8. Comcast begins rollout of IPv6 production network
  9. Microsoft patch snuffs out major worm potential
  10. iPhone apps: DIY skill that's in big demand

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: