Search This Blog

Wednesday, April 04, 2012

What is on a US Secret Service mainframe anyway?

FBI: Cyberattacks grow as national security menace | Endpoint Security: The Next Generation

Network World Security

Forward this to a Friend >>>


What is on a US Secret Service mainframe anyway?
Periodically the Department of Homeland Security (DHS), which oversees the US Secret Service issues what it calls Privacy Impact Statements on systems that collect personally identifiable information. Read More


WHITE PAPER: NetIQ

SANS Review of NetIQ Sentinel 7
A SIEM solution fully installed and capturing logs in under 15 minutes! Read how SANS analyst Jerry Schenk did it, and why he feels NetIQ Sentinel 7 is a great solution for the most pressing security problems facing enterprises today. Learn More!

WHITE PAPER: Oracle

Sustainable Compliance for the Payment Card Industry
This white paper explains the essentials of a PCI DSS compliance program, focusing on the critical but problematic areas that comprise much of the heart of the requirements. Learn More!

FBI: Cyberattacks grow as national security menace
WASHINGTON, D.C. -- Cyberattacks are starting to eclipse terrorism as a threat to the country, say top officials from the Federal Bureau of Investigation, speaking before an audience of security professionals here at the GovSec Conference today. Read More

Endpoint Security: The Next Generation
When you mention endpoint security in conversation, it's not unusual to get some type of visceral response -- eyes rolling, sighs, etc. Security professionals and the industry at large think of endpoint security as a commodity or "necessary evil." Some of my fellow analysts have gone so far to say that endpoint security as a category is dead (that's an old analyst trick for declaring that you've... Read More

Cybersecurity Roundup: Microsoft Crashes Botnet, Massive Credit Card Breach and More
This week Microsoft seized servers in several states and filed lawsuits against dozens of people in an anti-Zeus effort; and 10 million Visa and MasterCard accounts may be at risk after a major breach. Read More


WHITE PAPER: Tripwire

5 Challenges to Achieve PCI DSS Compliance
Treating PCI as an audit process, scoping it too broadly or not taking advantage of automated tools are all areas that create unnecessary compliance challenges. This white paper tackles the top PCI DSS compliance challenges and offers concrete recommendations on how to put together a PCI DSS compliance plan that works. Learn More Today!

Mozilla adds vulnerable Java plug-in versions to Firefox blocklist
Mozilla has blacklisted unpatched versions of the Java plug-in from Firefox on Windows in order to protect its users from attacks that exploit known vulnerabilities in those versions. Read More

Inside the fastest 3D Nano printer ever
Vienna University of Technology says its 3D printer creates images in world record time Read More

Whoops! Check Point lets checkpoint.com expire
It's got to be a little embarrassing for a security company steeped in paying attention to details like opening and closing firewall ports and monitoring whether applications are behaving oddly to overlook an arguably major item like maintaining the company's domain name, but it happened to Check Point Software. Read More


WHITE PAPER: Dell

Expert Guide to Secure Your Active Directory
Layered security is the way to go when it comes to protecting Active Directory. This expert e-guide explains the best method to use when planning and designing a security solution. Find out why it is important to secure Group Policy settings and discover how managed service accounts boost server security in R2. Learn More Now!

Cool old Ethernet paraphernalia
Ethernet is almost 40 years old. Here's a look at some of its product origins Read More

Ice IX malware tricks Facebook users into exposing credit card details, says Trusteer
A new configuration of the Ice IX malware attempts to trick its victims into exposing their credit card details when they try to access their Facebook accounts, according to security firm Trusteer. Read More

What do you want mobile phones to do in the next 40 years?
It's hard to believe that next year will be the 40th anniversary of the first handheld mobile phone call. What's also hard to fathom is that first call, between the father of the cell phone Martin Cooper, then of Motorola made to Joel Engel of Bell Labs was made on a phone that weighed over two pounds and cost nearly $4,000 and had a battery life of about 30 minutes. Read More

Adobe releases open source malware classification tool
Adobe Systems has released a malware classification tool in order to help security incident first responders, malware analysts and security researchers more easily identify malicious binary files. Read More

LulzSec accused Ryan Cleary arrested for emailing 'Sabu'
Alleged LulzSec member Ryan Cleary was re-arrested last month for breaching his bail conditions by emailing the hacking group's head 'Sabu' over the Christmas period, according to press reports. Read More



SLIDESHOWS

8 reasons why Windows 8 may not be ready for the desktop
How does this early version work as a traditional desktop/notebook OS?

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Citrix ditches OpenStack for Apache
  2. Dell's acquisition a Wyse one, analysts say
  3. Cool, weird and unusual security gear
  4. 8 reasons why Windows 8 may not be ready for the desktop
  5. Meet Cisco/Insieme's recruiter
  6. IETF attendees re-engineer their hotel's Wi-Fi network
  7. Google's 2012 April Fools' Day pranks
  8. 10 funny (?) April Fools' pranks - Web style
  9. 'Kelso' as Steve Jobs just doesn't sound right
  10. If the best technology won we would all be using OS/2

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: