Tuesday, December 20, 2011

IBM, HP, Microsoft lead patching laggards, says bug buyer

APTs: Unfortunately, There Is No Silver Bullet Solution | FAQ: Microsoft's new IE auto-upgrade scheme explained

Network World Security

Forward this to a Friend >>>


IBM, HP, Microsoft lead patching laggards, says bug buyer
IBM, HP and Microsoft led the list of companies that failed to patch vulnerabilities within six months of being notified by the world's biggest bug bounty program, according to HP TippingPoint's Zero-Day Initiative (ZDI). Read More


RESOURCE COMPLIMENTS OF: Palo Alto Networks

Evolving Your Data Center Network Security
Palo Alto Networks, Brocade, and guest speaker Principal Analyst John Kindervag from Forrester Research, Inc. will discuss the evolution of data center networks, and how leading-edge organizations are implementing next-generation data center network security. Click to continue

WHITE PAPER: Symantec

When Good Backups Go bad data recovery Failures
Whether you're considering software, cloud or an appliance for backup, it's time to modernize your infrastructure and make sure your approach includes: • Better protection of VMs • More use of disk and cloud as backup targets • Use of data deduplication and archiving • Simplified configuration, setup and use of Web-based administration View Now

APTs: Unfortunately, There Is No Silver Bullet Solution
Since publishing the ESG Research Report, U.S. Advanced Persistent Threat Analysis, I've been asked one question over and over: How can large organizations protect themselves against APTs? Good question but I find that most people who ask me this are expecting a simple answer. This attitude may have historical roots: Want to get rid of pesky SPAM emails? Buy a SPAM filter. Unfortunately, there... Read More

FAQ: Microsoft's new IE auto-upgrade scheme explained
We've assembled some of the most pressing questions -- and answers -- about Microsoft's new auto-upgrade plan for the Internet Explorer 8 browser. Read More


WHITE PAPER: Sybase

Enterprises Falling Short with Analytics Tools
This paper examines the use of analytics and reporting, and offers best practices for integrating solutions for improved business decision-making. Learn More

Critics stage last-ditch effort to derail domain name expansion plan
Debate around a controversial plan to add hundreds of new domain name extensions to the Internet infrastructure has reached a fever pitch in the nation's capital, as critics engage in a last-ditch effort to scrap or delay the plan, which is scheduled to launch Jan. 12. Read More

With great privilege comes great responsibility
While additional IT privileges are part of IT management, recent incidents and a number of surveys show many organizations don't do what's necessary to ensure such access isn't abused Read More


WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

Employee-owned devices surging for US companies, survey shows
Big companies, even those with demanding security needs, are nonetheless allowing employees to use personally owned smartphones and tablets for work, according to a new survey. And increasingly, it is employees and not the companies that are bearing the costs -- for the devices, and cellular data plans. Read More

Public to vote for best cutting-edge energy tech from 36 start-ups
The US Department of Energy today said it formally set the collection of 36 start-ups that will compete for its "America's Next Top Energy Innovator" challenge in 2012. Read More



SLIDESHOWS

8 Free Wi-Fi security tools
Here are several free programs you can use to do Wi-Fi stumbling and surveying on all the popular platforms - Windows, Mac OS X, and Linux. You'll be able see all the nearby wireless access points (APs) and their details, including channels, signal levels, and MAC address.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Ubiquitous surveillance from Big Brother's wayback machine
  2. Why Eric Schmidt's prediction about Android vs. iOS development is wrong
  3. iPhone 5 rumor roll-up for the week ending Dec. 16
  4. Cisco impresses with UCS
  5. 20 most anticipated tech products of 2012
  6. 2012 looking ripe for disgruntled IT pros to switch jobs
  7. 30 events that shaped Cisco in 2011
  8. 8 free Wi-Fi security tools
  9. 3 tips for avoiding tablet management headaches
  10. IT groups reveal their best enterprise tablet trick

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment