Friday, January 06, 2012

Dept. of Energy developing project to reinforce grid cybersecurity

Microsoft patch blows 'perfect game' but sends important message | Microsoft researcher: Passwords aren't dead but they need fixing

Network World Security

Forward this to a Friend >>>


Dept. of Energy developing project to reinforce grid cybersecurity
The government is trying once again to whip the key players behind the country's electrical grid into a security force that can defend against mounting cyber threats. Read More


WEBCAST: ForeScout Technologies

Experts Help CIOs Rethink Threat Prevention
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

WHITE PAPER: Aerohive

Eliminate Architectural Limitations of WLANs
Reduce the cost and complexity of wireless networks with cloud-enabled, distributed Wi-Fi and routing. By removing the architectural limitations of traditional WLANs, you can support identity-based access and enable delivery of mission-critical applications and services to any user, on any device, at any time without a single point of failure. Read now!

Microsoft patch blows 'perfect game' but sends important message
Read More

Microsoft researcher: Passwords aren't dead but they need fixing
Password use needs an overhaul that is driven not by guesswork but by actually understanding the real damage that can be done when password security is compromised, according to a Microsoft researcher. Read More


WEBCAST: Aternity

Banish Poor Application Performance
Are you ready to gain the proactive ability to rapidly respond to end user problems (before they call the help desk)? Then you won't want to miss a special event that will show you the latest innovation in end user monitoring. Learn more

Give the TSA more power so it can grope and then arrest you?
The TSA Blog has posted the TSA Top 10 Good Catches of 2011 which includes stopping almost ninjas and almost snakes on a plane, but excuse me for not throwing the TSA a parade. Read More

Privacy 2012: I know what you did at 3:30 a.m.
For a peek into what experts expect this year and beyond when it comes to privacy, we turn to the Rebecca Herold (aka the Privacy Professor) for answers. Read More


WHITE PAPER: NetSupport Inc

Reducing Hidden Operating Costs Through IT Asset Discovery
After reductions in headcount and procurements have been made, cost-cutting strategies are now turning to internal operations, and many IT decision makers are taking a closer look at indirect, or "soft," costs within these departments. Learn More

Social engineering attacks on the enterprise are trending upward
Amit Klein, CTO of the security firm Trusteer, predicts that social engineering attacks against enterprises will be on the rise in 2012. The problem is that too many people disclose too much personal information on social networks, and this gives thieves the leverage they need to gain and then abuse people's trust. Read More

Facebook Timeline Scams Prey on Wishful Thinking
If you're not a fan of Facebook's new Timeline, you're not alone. In a CIO.com poll of more than 600 people, 87 percent responded that they dislike the new profile design. Read More

Ramnit worm goes after Facebook credentials
A pervasive worm has expanded its reach to now steal login and password details for Facebook users, warned security vendor Seculert, which found a server holding 45,000 login credentials. Read More

2012 tech startups to watch product sampler
Read More



SLIDESHOWS

10 essential data center appliances
With all of the noise in data center networking focused on switches, fabrics and lossless Ethernet standards, appliances like WAN optimizers and application accelerators are often overlooked. But they are important components of the data center/cloud infrastructure, especially as organizations virtualize desktop applications for remote sites. Here's a listing of 10 of the top players, and their products, in data center appliances.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. IPad 3 rumor rollup for the week ending Jan. 3
  2. iPhone 5 rumor rollup for the week ending Dec. 31
  3. Cisco dumps the UMI personal telepresence very quietly
  4. IT pros lament: Low pay, no perks
  5. 2 days for amateur hacker to hack smart meter, fake readings
  6. Bandwidth bottlenecks loom large in the cloud
  7. 5 major changes facing the Internet in 2012
  8. Tips from IT professionals
  9. Mobility, cloud, analytics to reshape IT in 2012
  10. The future is now: CES 2012 video sneak peek

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment