Search This Blog

Tuesday, April 03, 2012

Cool, weird and unusual security gear

IETF plays Hide-and-Go-Seek with April Fools privacy protocol | 4 critical trends in IT business continuity

Network World Security

Forward this to a Friend >>>


Cool, weird and unusual security gear
The unusual security stuff for sale at the recent GovSec Conference in Washington, D.C. Read More


WHITE PAPER: NetIQ

SANS Review of NetIQ Sentinel 7
A SIEM solution fully installed and capturing logs in under 15 minutes! Read how SANS analyst Jerry Schenk did it, and why he feels NetIQ Sentinel 7 is a great solution for the most pressing security problems facing enterprises today. Learn More!

WHITE PAPER: IBM

Web Application Security e-Kit
IBM Rational® AppScan® can help you effectively design security into your products and services early in the lifecycle, in a way which is resilient to change. Download your complimentary e-Kit now to receive white papers, demos, podcasts and additional information. Read Now

IETF plays Hide-and-Go-Seek with April Fools privacy protocol
IETF pranksters this weekend revealed their latest April Fools' Day requests for comments, including one that outlines use of Hide-and-Go-Seek techniques to encourage network privacy. Read More

4 critical trends in IT business continuity
In IT, failure is not an option. Not surprisingly, organizations have made it a high priority to develop and implement reliable business continuity plans to ensure that IT services are always available to internal users and outside customers. Read More


WHITE PAPER: Oracle

Sustainable Compliance for the Payment Card Industry
This white paper explains the essentials of a PCI DSS compliance program, focusing on the critical but problematic areas that comprise much of the heart of the requirements. Learn More!

Apple mobile website access criticism 'flawed'
Research that criticised the accessibility of Apple's website for mobile users is flawed as it is based on 'inadequate' metrics, a customer experience agency has said. Read More

10 fun (and safe) ways to pretend to be a hacker
Enjoy hacking, Hollywood-style, with these video games Read More


WHITE PAPER: Sourcefire, Inc.

The Sourcefire FireAMP Vision
Still getting malware infections despite the time and money you've spent on security? Today's malware defenses have an inherent disadvantage in fighting today's threats. Designed for another time they are burdened with legacy constraints that hamper performance and protection. Learn More

ACLU: Most US police don't seek warrants before tracking cell phones
Many law enforcement agencies across the U.S. track mobile phones as part of investigations, but only a minority ask for court-ordered warrants, according to a new report released Monday by the American Civil Liberties Union. Read More

Global Payments says fewer than 1.5M cards affected in data theft
Payments processing services company, Global Payments said late Sunday that information on up to 1.5 million card numbers may have been "exported" as a result of an unauthorized access into its processing system. Read More

New "bootkit" Android malware infects more than 50 apps, 1600 devices
Another week, another story of potentially major Android malware out in the wild. The latest batch comes to us courtesy of Dr. Xuxian Jiang a professor at North Carolina State University and the chief scientist for NQ Mobile. The new malware strain is known as "DFKBootkit" and is described by Jiang as "the closest attempt by malware authors to create a full-fledged bootkit on Android." NQ says... Read More

Do Insecure Open Source Components Threaten Your Apps?
Open Source components are a boon to developers, allowing them to efficiently write code without reinventing the wheel. But since open source lacks the notification infrastructure of commercial software, organizations must maintain a running inventory of open source components and their dependencies in production applications or risk deploying apps with known vulnerabilities. Read More



SLIDESHOWS

20 iPad business apps every CIO should want
iPad apps for sales forces, IT departments and more.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 10 funny (?) April Fools' pranks - Web style
  2. Google's 2012 April Fools' Day pranks
  3. New iPad opener: Forego finesse with this April Fools' Day special
  4. New gov't weapon: Warrantless cell phone surveillance
  5. April Fools: Google fills huge gap with 8-bit Google Map
  6. IETF attendees re-engineer their hotel's Wi-Fi network
  7. Kelihos gang is building a new botnet, researchers say
  8. Cisco poaching rivals for SDN spin-in
  9. Critical milestones in Cisco history
  10. Cisco forces manufacturer's hand; company adopts Microsoft Lync

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: