Search This Blog

Tuesday, December 13, 2011

5 IT Security Breakthroughs Promise to Thwart Threats

Some Thoughts on The SANS 20 Critical Security Controls | Air Force looking for the ultimate massive bomb

Network World Security

Forward this to a Friend >>>


5 IT Security Breakthroughs Promise to Thwart Threats
For the past 25 years, a war has waged between malicious programmers and the researchers trying to make computing safe for the enterprise. The battle has shown no signs of subsiding — once a new countermeasure is deployed, the hackers find new ways to make IT worried. Read More


RESOURCE COMPLIMENTS OF: SafeNet

Are You Ready to Turn the Cloud On?
Your data is on the move and you need practical ways to secure and manage it, no matter where it lives, no matter what the environment. That requires pragmatic thinking, and ways to extend protection and compliance to virtual environments, while maintaining visibility and centralized control. It's time to turn the cloud on with SafeNet.

WHITE PAPER: Symantec

When Good Backups Go bad data recovery Failures
Whether you're considering software, cloud or an appliance for backup, it's time to modernize your infrastructure and make sure your approach includes: • Better protection of VMs • More use of disk and cloud as backup targets • Use of data deduplication and archiving • Simplified configuration, setup and use of Web-based administration View Now

Some Thoughts on The SANS 20 Critical Security Controls
As I transitioned from the weekend to the work week last night, I settled down to review the 20 Critical Security Controls (v3) published by the SANS Institute. If you haven't seen this list, you really should take a look as it's an extremely focused, well written, metrics-based strategy for protecting your organization against the most likely security risks. The first two controls are: 1. Inventory... Read More

Air Force looking for the ultimate massive bomb
Apparently nuclear or huge, heavy bombs are not enough for the Air Force. No siree, it wants the ultimate bomb, a futuristic explosive that can, in its words, defeat well-defended, hard and deeply buried targets. Read More


WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

Serious bugs force SAP to put brakes on community site upgrade
SAP has abruptly put the brakes on a planned upgrade to its massive community network portal, which was set to be rolled out this month, due to a number of lingering, "critical" bugs. Read More

The security threat Stephen King warned us about?
Remember the film "Maximum Overdrive," where machines took over and went on a murderous rampage? With cars and appliances ever more computerized, such a security threat seems a little less farfetched as we head into 2012. Read More


WHITE PAPER: Sybase

Scaling Out Query Performance with Sybase IQ 15.3
This paper is meant to provide a holistic perspective and introduce the technical concepts behind DQP in general and Sybase® IQ 15.3's DQP implementation through the PlexQ Distributed Query Platform. Read now.

Google pulls 22 more malicious Android apps from Market
Google has removed nearly two dozen malware-infected apps from its official Android Market in the last several days, according to San Francisco-based Lookout Security. Read More

School shuns Apple servers for Windows
For a self-described "Mac person" working as a technology manager in a college preparatory school that had been a "Mac school" for as long as he could remember, it was a hard thing to have to face but he said it out loud: "Apple never took enterprise computing seriously," says a somewhat disillusioned Adam Gerson, co-director of technology at Columbia Grammar and Preparatory School in New York City. Read More

Irony: Surveillance Industry Objects to Spying Secrets & Mass Monitoring Leaks
While not everyone considers mass surveillance to be Satan, signing online does not automatically forfeit your right to value your privacy. In fact, it's sickening when alleged 'white hats' wear black hats to exploit users in the name of surveillance for security. If a hacker were to engage in net or cell phone surveillance, or breach email, then law enforcement would call that illegal and go on the... Read More

FTC mails out refund checks for buyers of scareware
The U.S. Federal Trade Commission has begun to mail refund checks to computer owners who purchased so-called scareware from vendors who allegedly used deceptive advertising to trick customers into buying the software to fix their supposedly infected computers. Read More



SLIDESHOWS

8 Free Wi-Fi security tools
Here are several free programs you can use to do Wi-Fi stumbling and surveying on all the popular platforms - Windows, Mac OS X, and Linux. You'll be able see all the nearby wireless access points (APs) and their details, including channels, signal levels, and MAC address.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. 8 free Wi-Fi security tools
  2. Surveillance industry objects to spying secrets & mass monitoring leaks
  3. Microsoft: 5 smart, 5 dumb moves the company made in 2011
  4. Usenix: Google deploys IPv6 for internal networks
  5. The tech jobs hiring boom is real -- for these skills
  6. Security roundup
  7. What's really going on with Carrier IQ on your phone
  8. Private investment firm buys Blue Coat for $1.3 billion
  9. 10 most powerful cloud companies
  10. Cisco storms back in switching

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: