Search This Blog

Friday, March 02, 2012

How to catch an Internet cyber thief

What's hot at RSA 2012 | MIT takes aim at secure, self-healing cloud

Network World Compliance

Forward this to a Friend >>>


How to catch an Internet cyber thief
They're out there, says security researchers: the Chinese hackers attempting to break into U.S. enterprises, and jihadist terrorists that brazenly post videos of sniper killings, while stealing credit-cards to launder money for funding nefarious campaigns in Mideast or Caucasus hot spots. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant on-demand remote support with LogMeIn Rescue
Without pre-installed software, quickly connect to PCs, Macs, smartphones and tablets anywhere in the world. Get in, solve the problem, and be done in a flash. Plus, Rescue's SaaS-based platform means free upgrades and zero maintenance. Try it free today.

RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
Companies like Foursquare, StrongMail, and ExoIS are taking charge of cloud server security using Halo from CloudPassage, which ensures easy, scalable, and automated security for dynamic cloud environments. Register today to Secure 25 Cloud Servers for Free with Halo Basic.

What's hot at RSA 2012
Read More

MIT takes aim at secure, self-healing cloud
What if a cloud computing infrastructure could recognize a cyberattack, eliminate it and never stop working while all that is being done? That's what researchers at MIT, with help from the federal government, are investigating the feasibility of. Read More

BYOD: There is no stopping employees' devices on your network
It used to be the IT department's answer was always no when an employee asked to use a personal device for work. IT often felt the risk was far too great to the company's network security to allow this. Read More

Cisco takes first step in delivering on SecureX vision
A year Cisco put forward its vision called SecureX about how it would devise ways that its network products, first its firewalls, would be able to capture information related to user devices, especially tablets and smartphones, to exert context-based security control. Today, Cisco took the first step to deliver on that vision while acknowledging more needs to be done. Read More


WHITE PAPER: Quest Software

Want to Make Compliance Easy? Get Proactive!
Is your business reactively implementing compliance? If so, you're wasting time and money and destroying productivity. Get proactive! In this Quest white paper, see how centralized monitoring and reporting is more secure, saves money and helps you adapt and manage compliance needs today and tomorrow. Read Now!

Alleged RSA crypto flaw hotly debated
Is the RSA cryptosystem flawed or is the recent sharp criticism of it the result of poor — or even malicious — implementation of key-generation techniques that appear to have rendered some RSA-based encryption keys crackable? Read More

RSA Conference: Symantec inaugurates O3 cloud-based single sign-on service
At the RSA Conference Tuesday, Symantec announced general availability of its O3 cloud-based single sign-on (SSO) and authentication service, which adheres to a concept company CEO Enrique Salem outlined exactly a year ago at RSA 2011. Symantec also provided detail on future capabilities the O3 cloud service will have for data-loss prevention and encryption. Read More

RSA teams to bolster security for Apple, Google, RIM devices
RSA, the security division of EMC, today said it would collaborate with several mobile and virtualization platform vendors to integrate RSA two-factor authentication and risk-detection technologies. Read More

Malware increasingly uses DNS as command and control channel to avoid detection, experts say
The number of malware threats that receive instructions from attackers through DNS is expected to increase, and most companies are not currently scanning for such activity on their networks, security experts said at the RSA Conference 2012 on Tuesday. Read More


WHITE PAPER: APC

How Data Center Management Software Improves Planning
Business executives are challenging their IT staffs to convert data centers from cost centers into producers of business value. Data centers can make a significant impact to the bottom line by enabling the business to respond more quickly to market demands. Learn More

Tablets With Serious Security for Business
These tablets have extra security features that will keep your work safe and your IT pros happy. Read More

Why we kept LulzSec safe
On June 2nd, 2011, the antisec hacker group known as LulzSec launched a web site. Although they had been an active hacking group for several weeks, the creation of Lulzsecurity.com was their first official web presence other than the Twitter account they had been using. Read More

CA links data-loss prevention to identify management for SharePoint file protection
At the RSA Conference today, CA Technologies put forward product plans for linking its data-loss prevention (DLP) technology with its identity access and management to dynamically restrict individuals from accessing information deemed off limits -- in this case, data held in Microsoft SharePoint. Read More

6 things you need to know about Google's new privacy policy
When you need to look something up, do you Google it? Do you enjoy watching cat videos on You Tube? Do you hang out with friends on Google+? Have a Gmail account? Read More

Trend Micro overhauls threat-detection product, returns it to customer premises
Trend Micro today announced Deep Discovery, a threat-detection tool designed to monitor network traffic in order to detect signs of stealthy attacks aimed at stealing corporate data. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. How to protect your online privacy
  2. Mozilla's 'modest proposal': Dump the smartphone OS
  3. Juniper targeting 7 key market segments
  4. iPad 3 concept video: How Apple could really blow us away
  5. Microsoft's Azure cloud suffers serious outage
  6. Microsoft unveils Windows 8 "Consumer Preview," downloads start
  7. NSA defines smartphone strategy: Think Android (maybe)
  8. Speedy 802.11ac Wi-Fi set for fast, wide rollout
  9. Alleged RSA crypto flaw hotly debated
  10. iPad 3 rumor rollup for the week ending Feb. 28

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: