Search This Blog

Friday, January 06, 2012

Government engineers actively plan for cyberwar

Windows 8 picture password is 'Fisher-Price toy' says father of 2-factor authentication | History's infamous social engineers

Network World Compliance

Forward this to a Friend >>>


Government engineers actively plan for cyberwar
Governments are arming themselves to their cyber-teeth with offensive and counter-defense cyber weapons, and there's little enterprises can do to avoid the fray. Read More


WHITE PAPER: BMC

Three Steps to Effective Cloud Planning & Design
Before you build your cloud, there are many considerations. Are there security requirements? Compliance rules? Will you use public cloud resources as well? Learn more about how to plan a cloud effectively – from defining requirements to identifying the costs - in this compelling white paper from BMC Software. Learn More!

WHITE PAPER: SonicWALL

Next-Gen Firewalls for K-12: Hall County Schools
How Hall County Schools leverages SonicWALL Appliance Intelligence, Control and Visualization for bandwidth management and prioritization of application traffic for VoIP, video conferencing and social media resources. Read now.

Windows 8 picture password is 'Fisher-Price toy' says father of 2-factor authentication
The Windows 8 feature that logs users in if they touch certain points in a photo in the right order might be fun, but it's not very good security, according to the inventor of RSA's SecurID token. Read More

History's infamous social engineers
Read More

Tips from IT professionals on how to handle virtual desktops, wireless, network performance issues
Schools are for learning, and the information technology and security professionals who support networks and applications in the nation's K-12 and university systems are discovering new tactics in what can be challenging IT environments. Here we talk to four professionals in the education realm to get a sense for their top IT issues and what they do to handle them. Read More


WHITE PAPER: HP & Intel

Virtualization and Business Continuity
In this report, Enterprise Strategy Group reviews how HP's portfolio of hardware, software, and services can provide the foundational support for VMware environments. Read Now!

Ramnit worm goes after Facebook credentials
A pervasive worm has expanded its reach to now steal login and password details for Facebook users, warned security vendor Seculert, which found a server holding 45,000 login credentials. Read More

Two new security books ponder: Just how vulnerable are we?
Two recently-published books, "America the Vulnerable" by Joel Brenner, a former official at the National Security Agency (NSA) and "When Gadgets Betray Us," by writer and security analyst Robert Vamosi, have one theme in common: We've come to depend on modern networks and technology, but the compromise of them by attackers is a serious threat to both individuals and society as a whole. Read More

Check Point supports cloud security for Amazon Web Services
Check Point and Amazon Web Services are teaming up to enable Check Point Security Gateway functionality to boost cloud security for business assets. Read More


WHITE PAPER: Akamai Technologies, Inc.

Akamai Cloud Optimization for Amazon EC2™
The emergence of public cloud platforms and services has IT organizations thinking about which applications they want to keep in-house and which they can build within the cloud. Read more

Microsoft researcher: Passwords aren't dead but they need fixing
Password use needs an overhaul that is driven not by guesswork but by actually understanding the real damage that can be done when password security is compromised, according to a Microsoft researcher. Read More

Privacy 2012: I know what you did at 3:30 a.m.
For a peek into what experts expect this year and beyond when it comes to privacy, we turn to the Rebecca Herold (aka the Privacy Professor) for answers. Read More

More SCADA security flaws surface
Numerous new authentication issues saddle Siemens' industrial control applications. Read More

Network World's 2011 Tech News Quiz
From Lulzsec to Apple patents to AT&T merger proposals, here's the year in multiple-choice questions Read More

SpyEye malware borrows Zeus trick to mask fraud
A powerful bank-fraud software program, SpyEye, has been seen with a feature designed to keep victims in the dark long after fraud has taken place, according to security vendor Trusteer. Read More



SLIDESHOWS

10 essential data center appliances
With all of the noise in data center networking focused on switches, fabrics and lossless Ethernet standards, appliances like WAN optimizers and application accelerators are often overlooked. But they are important components of the data center/cloud infrastructure, especially as organizations virtualize desktop applications for remote sites. Here's a listing of 10 of the top players, and their products, in data center appliances.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. IPad 3 rumor rollup for the week ending Jan. 3
  2. iPhone 5 rumor rollup for the week ending Dec. 31
  3. Cisco dumps the UMI personal telepresence very quietly
  4. IT pros lament: Low pay, no perks
  5. 2 days for amateur hacker to hack smart meter, fake readings
  6. Bandwidth bottlenecks loom large in the cloud
  7. 5 major changes facing the Internet in 2012
  8. Tips from IT professionals
  9. Mobility, cloud, analytics to reshape IT in 2012
  10. The future is now: CES 2012 video sneak peek

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: