Search This Blog

Thursday, March 01, 2012

Rapidly evolving low-cost mobile technology keeps the military up at night

  Alleged RSA crypto flaw hotly debated | Cisco updates security certs
 
  Network World Security

Forward this to a Friend >>>


Rapidly evolving low-cost mobile technology keeps the military up at night
Are smartphones and other devices the scourge of cyber security warriors worldwide? Read More


WHITE PAPER: GFI Software

GFI VIPRE Antivirus Business 5.0
This free fully-functioning 30-day trial of GFI VIPRE Business is designed to optimize overall performance by melding antivirus and antispyware together into one powerful engine. Learn More

WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

Alleged RSA crypto flaw hotly debated
Is the RSA cryptosystem flawed or is the recent sharp criticism of it the result of poor — or even malicious — implementation of key-generation techniques that appear to have rendered some RSA-based encryption keys crackable? Read More

Cisco updates security certs
Cisco this week updated its CCNA and CCNP Security certifications to keep certificates up-to-date on new security products and best practices. Read More

Malware increasingly uses DNS as command and control channel to avoid detection, experts say
The number of malware threats that receive instructions from attackers through DNS is expected to increase, and most companies are not currently scanning for such activity on their networks, security experts said at the RSA Conference 2012 on Tuesday. Read More


WHITE PAPER: NetIQ

5 Things You Need to Know About Disaster Recovery Planning
Download this short, easy-to-digest Disaster Recovery eBook today. It's packed with unique planning approaches to make your data center less vulnerable to natural and man-made disasters. Warning, side effects may include reduced stress levels. Learn More!

BYOD: There is no stopping employees' devices on your network
It used to be the IT department's answer was always no when an employee asked to use a personal device for work. IT often felt the risk was far too great to the company's network security to allow this. Read More

Who do you blame when IT breaks?
There's always a reason why things break in IT, and the powers-that-be can usually find someone to blame -- be it an data center operations staff member, an OEM, a systems integrator or a third party service provider. Read More

Why we kept LulzSec safe
On June 2nd, 2011, the antisec hacker group known as LulzSec launched a web site. Although they had been an active hacking group for several weeks, the creation of Lulzsecurity.com was their first official web presence other than the Twitter account they had been using. Read More


WHITE PAPER: Tripwire

Responding to New Threats in More Complex IT Environments
As organizations today face the challenge of protecting their valuable data, they must balance that protection with giving business users and customers access to the data. Learn More!

IT execs must shift security approaches
IT security executives must secure what they cannot directly control to properly protect enterprise data in the coming years. Read More

National Security Agency defines smartphone strategy: Think Android (maybe)
America's intelligence agency, the National Security Agency (NSA), today disclosed how it's going to handle mobile security. Read More

NTIA: Mobile privacy may be a top priority in new push
Transparency about the personal data that mobile applications collect may be at the top of the agenda as the U.S. Department of Commerce begins work on privacy codes of conduct for online businesses. Read More

25 alleged Anonymous members busted by Interpol
International police organization Interpol today said it arrested 25 people, aged between 17 and 40, and seized a variety of computer equipment it said were part of the hactivist group Anonymous. The Interpol web site was promptly hit by a distributed denial-of-service (DDoS) attack and shut down. Read More

Microsoft admits hackers nabbed credit card info
Do you recall when the Microsoft Store in India was hacked by a group of Chinese hackers dubbed Evil Shadow? Read More

 
 
 

SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. How to protect your privacy on Google
  2. 25 alleged Anonymous members busted by Interpol
  3. Windows Phone smokes its competition at MWC ... sort of
  4. Cisco bounces back
  5. Mobile World Congress 2012: This year's hottest gadgets
  6. 6 things you need to know about Google's new privacy policy
  7. IBM scientists discuss quantum computing breakthrough
  8. Tech debate: The future of end user computing
  9. Steve Jobs ignored Warren Buffet's advice for a stock buyback
  10. Windows 8 most burning questions
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: