Search This Blog

Thursday, February 16, 2012

13 security myths

  The Evolution of Endpoint Security | Malware Network Threats Rising, How to Defend Yourself
 
  Network World Security

Forward this to a Friend >>>


13 security myths
Security experts hammer on security ideas they say are just "myths" Read More


RESOURCE COMPLIMENTS OF: CSO Perspective

Protect your Organization from CyberAttack!
Hear from the Honorable Dale Meyerrose, VP and General Manager, Cyber Integrated Solutions, Harris Corporation on Understanding Today's Cyber Attacker: The State of Cyber Crime and Espionage. Attend The CSO Perspectives Seminar on March 22nd in Washington D.C. and learn more!

WHITE PAPER: Quantum

Meet "Big Data" Backup Challenges
Are you experiencing a data explosion? The trend toward leveraging Big Data for competitive advantage helps IT professionals successfully meet business goals. Learn how to reliably manage, store and access vast amounts of archived data while protecting it and keeping costs low. View Now

The Evolution of Endpoint Security
Back in 2007, ESG asked 206 IT enterprise security professionals to respond to the following statement: Endpoint security has become a commodity market with little difference between products. A majority (58%) of respondents either "strongly agreed" or "agreed" with this statement. Read More

Malware Network Threats Rising, How to Defend Yourself
In 2011, cybercriminals stepped up their game with the creation of malware networks (malnets)-distributed network infrastructures that exploit popular places on the Internet like search engines and social networking sites to repeatedly launch a variety of malware attacks. Read More

Prioritizing tech projects: How managers make a short list of long demands
As top technology dog at Aspen Skiing Co. for the last 16 years, Paul Major has honed the art of keeping multiple balls in the air. Read More

ENIAC, world's first digital computer, turns 66
Massive machine was world's first large-scale electronic general-purpose digital computer Read More


WHITE PAPER: Webroot

How to Protect Your Business from the Coming Malware Storm
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service. Read More Today!

Slideshow: 15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one? For some perspective, we take a look at 15 of the biggest incidents in recent memory. Read More

Senators Unveil Cybersecurity Bill to Empower Homeland Security
After years of deliberations and several false starts, a bipartisan group of lawmakers introduce cybersecurity overhaul that would authorize the Department of Homeland Security to oversee security at critical infrastructure providers, improve system of sharing information about threats. Read More

US could save $4.4B by dumping paper $1 bill for coin
If the US government really considers getting rid of the paper $1 bill in favor of a coin it could save $4.4 billion over 30 years, or an average of about $146 million per year. Read More

Startup Porticor launches with encryption technology for cloud computing
Israel-based startup Porticor launches this week with technology aimed at giving enterprises a way to encrypt data held in cloud computing services, including those from Amazon and Rackspace. Read More


WHITE PAPER: Internap

New eBook: Enterprise IP Buyer's Guide
We are all aware of the impact performance can have on the bottom line. Organizations are increasingly choosing Website Performance Optimization (WPO) technologies to boost reliability, availability and their bottom line. Learn More

Philips reports security breach
Health-care technology and lighting vendor Royal Philips Electronics has reported a possible security breach affecting a portion of its website. Read More

Researchers crack online encryption system
An online encryption method widely used to protect banking, email, e-commerce and other sensitive Internet transactions is not as secure as assumed, according to a team cryptanalysts. Read More

Are self-signed SSL certificates as insecure as they say?
Given the recent problems with SSL certificates provided by third-party companies, one has to wonder why we place all this trust in these vendors. We allow them to process and produce "trusted" certificates for our websites, but in the end even Google, Microsoft and state and federal governments are falling victim to fraud. Read More

First look: Norton's 2012 desktop, smartphone security push
Norton today released an updated version of its Norton 360 desktop and mobile security software, while also rolling out a new licensing arrangement for combined PC, Mac and Android use. Read More

Four keys to successful BYOD
The bring your own device (BYOD) movement formally advocates use of personal equipment for work and obligates IT to ensure jobs can be performed with an acceptable level of security, but how can risks be addressed given the range of devices used and the fact that you lack control of the end point? Read More

 
 
 

SLIDESHOWS

Firefox faceoff: Nightly vs. Pale Moon vs. Waterfox
Three unofficial Firefox variants take advantage of 64-bit processors and 64-bit version of Windows 7.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. 13 security myths you'll hear -- but should you believe?
  2. 10 years after famous Slashdot marriage proposal
  3. Researcher: Email wording a dead giveaway of who's the boss
  4. Forget about public or private cloud, it's all about hyper-hybrid
  5. Mozilla will ask all certificate authorities to revoke SSL-spying certificates
  6. FBI says social media monitoring won't infringe privacy rights
  7. Crypto experts analyze millions of X.509 certificates, call RSA crypto flawed
  8. Two-thirds of Google+ users are men
  9. First look: Cisco Cius
  10. NASA unplugs last mainframe
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: