Friday, January 20, 2012

Copyright, piracy battle rages: Megaupload.com shut down, execs jailed

Firesheep moment for SCADA: Hacking critical infrastructure systems now as easy as pushing a button? | Information Security Skills Shortage Continues

Network World Security

Forward this to a Friend >>>


Copyright, piracy battle rages: Megaupload.com shut down, execs jailed
The US Department of Justice today said it charged seven people and two corporations with running what it called an international organized criminal enterprise allegedly responsible for massive worldwide online piracy of numerous types of copyrighted works. The DoJ stated that through the company known as Megaupload.com and other related sites, the group has generated more than $175 million in criminal... Read More


WEBCAST: ForeScout Technologies

Experts Help CIOs Rethink Threat Prevention
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
CloudPassage Halo is the award winning cloud server security platform that has everything you need to secure your cloud servers - from dynamic firewalls to intrusion detection, and account management. Halo is SaaS and installs in 5 minutes. Halo Basic is free for up to 25 servers. Try Halo

Firesheep moment for SCADA: Hacking critical infrastructure systems now as easy as pushing a button?
Remember Firesheep . . . the addon that was so easy to use that even the clueless could successfully hack Facebook and Twitter accounts via Wi-Fi? Read More

Information Security Skills Shortage Continues
Like other analyst firms, ESG conducts research on IT Spending Intentions annually. One of the things we track is IT hiring plans in all areas including IT security. In 2011: • 35% of all mid-market and enterprise organizations planned on hiring security staff • 22% believed they had a "problematic shortage" of security skills at their organizations The situation has not improved at all... Read More

RSA says 2012 will focus on mobile, cloud security
Beyond addressing details about its big breach of 2011, RSA Security executives this week outlined its 2012 product strategy that is centered on three areas, mobility, anti-threat and cloud security. Read More


WHITE PAPER: Quantum

Big Data: Managing Explosive Growth
Are you experiencing a data explosion? The trend toward leveraging Big Data for competitive advantage helps IT professionals successfully meet business goals. Learn how to reliably manage, store and access vast amounts of archived data while protecting it and keeping costs low. View Now

RSA, unapologetic, looks to move beyond The Breach
Last April's RSA security breach was engineered by a nation-state whose ultimate goal was not to steal secrets about SecurID tokens but rather to use those secrets to compromise U.S. military contractors that protected their networks with the devices, RSA officials say. Read More

Inside Google at work and play
Google's new Venice Beach campus features a ton of cool activities for workers developing Chrome, YouTube and Google+ apps Read More

Security history: Nothing like an old-fashioned boot sector virus
It has been 26 years to the day when the computing world was introduced to its first virus: The Brain. Read More


WHITE PAPER: NetIQ

Streamlining IT Operations with Business Service Management
This IDC Technology Spotlight examines the benefits of a business service management practice and tools in response to IT environments becoming more dynamic and complex due to the increased use of virtualization, cloud, SOA, and n-tier application architectures. Learn More

Help desks critical to BYOD efforts
It seems like it was only yesterday when help desk staff could focus on PCs, Windows, the network, and perhaps a few BlackBerrys for executives and the sales team. Not anymore. Read More

Surging mobile use creating big security headaches: survey
An explosion of personal mobile devices on corporate networks is creating new security headaches for the enterprise, according to a survey of IT professionals by a network security vendor. Read More

Apple Mac-based security threats jumped in 2011
New Mac-based security threats jumped in 2011, but still remain far below that of Windows PCs, according to a posting by F-Secure Labs. Read More

Microsoft's Trustworthy Computing Group Turns 10
It was ten years (and a week) ago that Bill Gates announced to all Microsoft employees that the company was creating a new group that wasn't designed to make a dime of money, but it would become a major player in the company. In his memo announcing the Trustworthy Computing initiative, Gates called upon employees across the company to fundamentally rethink their approach to product development and... Read More

NASA: Solar blasts decreased orbital debris in 2011
While high-levels of solar activity is not good news for satellites, GPS and electronics they can have one benefit: such massive solar bursts can decrease the amounts of dangerous orbital debris. Read More



SLIDESHOWS

12 available devices to test drive Windows 8
Here are a dozen off-the-shelf devices that Microsoft says it uses in its labs to put Windows 8 through its paces. You, too, can buy one if you haven't already.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Inside Google at work and play
  2. 12 available devices to test drive Windows 8
  3. The 36 best iPhone games
  4. What do your gadgets really weigh?
  5. The best of CES 2012
  6. Will 2012 be the dawn of DNSSEC?
  7. RSA, unapologetic, looks to move beyond The Breach
  8. Fundamental Oracle flaw revealed
  9. 5 reasons Macs are gaining ground in the enterprise
  10. New Facebook attack targets e-cash users

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment