Tuesday, May 29, 2012

NSA security expert worries about mobility, cloud

Patch management still big stumbling block in risk management, survey shows | Researchers identify Stuxnet-like cyberespionage malware called 'Flame'

Network World Security

Forward this to a Friend >>>


NSA security expert worries about mobility, cloud
Approaching its 60th birthday, the National Security Agency (NSA) has a staff some 35,000 strong worldwide, and an impressive building complex in Fort Meade, Md., where the walls are lined with copper mesh to prevent electronic eavesdropping. True to its origins dating back to breaking enemy code during World War II, the agency has two primary missions: signals Intelligence (SIGINT) and information assurance (IA). Read More


WHITE PAPER: Fortinet

Next-Generation Security for Enterprise Networks
Since the concept of a 'next-generation firewall' was introduced several years ago by Gartner, many network security vendors have introduced their own next-generation firewalls to address this product category - but with varying results. View Now

WHITE PAPER: FireEye

Strategies for advanced threat security in 2012
Download this new FireEye research brief and learn how traditional security defenses can leave you vulnerable and necessary steps to gain visibility into all stages of the attack vector. Read now.

Patch management still big stumbling block in risk management, survey shows
Everyone talks about "risk and compliance" in security, but what do companies have to do to make it through audits and meet regulations related to information security? And what are the costs? Read More

Researchers identify Stuxnet-like cyberespionage malware called 'Flame'
A new, highly sophisticated malware threat that was predominantly used in cyberespionage attacks against targets in the Middle East has been identified and analyzed by researchers from several security companies and organizations. Read More


WHITE PAPER: BMC Software

Switching Schedulers – Not As Complicated As You Think
Changing or consolidating job schedulers may seem daunting. However, the benefits of switching to enterprise workload automation outweigh the risks. Read how BMC can help realize goals like reduced cost, top-down visibility, improved SLAs, and a single enterprise view across all platforms. Learn More Today!

Now Pay Attention, 007: Flame Malware Blurs the Line Between Fiction and Reality
In Ian Fleming's universe of James Bond, the character Q – standing for "Quartermaster" and for so many years played in the film adaptations by Desmond Llewellyn – provides Agent 007 with all of the gadgets and just-out-of-reach-from-the-real-world technological tools he needs to achieve the goals of Her Majesty's Secret Service. One of the most amazing things about Q's technological... Read More

Malware exists that lets Bad Guys hijack webcams and microphones. The U.S. government can't even do that yet, at least not legally, but it is working on it. Remember: It's not paranoia if they're actually after you.
Lawrence Strickling, the lead administrator of the agency doling out stimulus money for broadband deployments, urges grant recipients to amplify success stories as program faces political persecution in election season. Read More


WHITE PAPER: AppSense

A comprehensive approach to user virtualization
User virtualization ushers in a new era for IT by unlocking the user layer from devices, operating systems, and applications. For the first time, IT needs to manage only a single instance of the user, eliminating the arduous task of running unique configurations on every device. Learn More

FBI Creates Surveillance Unit to Build Backdoors into the Web
The FBI still claims it is going dark and its monitoring abilities could be rendered ineffective without surveillance backdoors built into communications, according to FBI Director Robert Mueller's testimony before the Senate Judiciary Committee. Read More

Information of U.S. federal employees exposed
A hack in July last year of a computer used by third-party services provider Serco to support the Thrift Savings Plan run by the U.S. Federal Retirement Thrift Investment Board resulted in unauthorized access to the personal information of about 123,201 TSP participants and payees, FRTIB said Friday. Read More

Gartner: Don't trust cloud provider to protect your corporate assets
When a family with a baby buys a new car, they don't buy a car seat from the vehicle manufacturer: There is specialized equipment to handle the family's most sensitive asset. John Pescatore, a Gartner vice president and security analyst, says cloud security can be thought of in a similar way: Users shouldn't rely on their cloud service provider's security features to protect their most critical data. Read More



SLIDESHOWS

Whose high-tech exec job hinges on the presidential election?
There are a ton of high-tech managers and regulators in the federalgovernment who may be changing jobs come November.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Windows Phone 8, or 'Apollo,' debuts next month at San Francisco conference
  2. Extreme BYOD: When consumer tech goes to unexpected places
  3. iPhone display rumors galore
  4. Supercomputer to connect to 400PB of storage via Ethernet
  5. Tech's $20 million CEOs
  6. Sales of unused IPv4 addresses gathering steam
  7. Groups launch gigabit-per-second broadband project
  8. 9 warning signs of bad IT architecture
  9. Google warns users infected with DNSCharger as Web outage nears
  10. Tech managers aren't doing a good job developing IT talent

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment