Thursday, May 10, 2012

U.S.-Israel project with Motorola leads to security-hardened industrial control system

  FBI issues warning on hotel Internet connections | US sets $1.4M to get unique metaphor-recognizing software system humming
 
  Network World Security

Forward this to a Friend >>>


U.S.-Israel project with Motorola leads to security-hardened industrial control system
The security associated with industrial control systems (ICS) is facing heavy criticism this week at the ICS Joint Working Group 2012 Spring Conference, sponsored by the U.S. Department of Homeland Security (DHS). DHS is concerned cyberattacks could disrupt America's energy, water and manufacturing facilities. But DHS is also taking concrete steps to improve ICS through a joint effort that includes Motorola Solutions, DHS and Israel's National Information Security Authority -- the Israeli government agency tasked with protecting its critical infrastructure. Together, under what's called the "Secure Controller Joint Project," it has led to Motorola coming up with the security-hardened ACE-3600, which was unveiled today at the conference. Read More


WHITE PAPER: Mitel

Uniting the Worlds of Data and Voice
This White Paper from Mitel and VMware evaluates the benefits and methodology for integrating Unified Communications into the Virtual Data Center. Discover the benefits and learn how your organization can maximize its virtualization investments by integrating your voice applications. Learn More

WHITE PAPER: Lumension

The CISOs Guide to Measuring IT Security
Learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat. Learn More

FBI issues warning on hotel Internet connections
The FBI today warned travelers there has been an uptick in malicious software infecting laptops and other devices linked to hotel Internet connections. Read More

US sets $1.4M to get unique metaphor-recognizing software system humming
An innovative project, called Autonomous Dynamic Analysis of Metaphor and Analogy, or ADAMA, aims to build a software system that can automatically analyze metaphorical speech in five different languages by analyzing huge quantities of online data got off the ground this week when the U.S. Army Research Laboratory awarded a $1.4 million contract to the team conducting the research. Read More

Counterintelligence Surveillance Swelled Another 10% in 2011
Surprise, or maybe not so much, counterintelligence surveillance increased in 2011 according to the new annual Foreign Intelligence Surveillance Act (FISA) report [PDF]. The Justice Department filed 1,676 applications to conduct electronic surveillance in 2011, which is up from the 1,579 filed in 2010. Read More


WHITE PAPER: Fortinet

Next-Generation Security for Enterprise Networks
Since the concept of a 'next-generation firewall' was introduced several years ago by Gartner, many network security vendors have introduced their own next-generation firewalls to address this product category - but with varying results. View Now

Security of industrial control systems questioned at DHS conference
Operators of America's vital power, water and manufacturing facilities use industrial control systems (ICS) to manage them, and the security of these systems, increasingly linked with Microsoft Windows and the Internet, is now under intense scrutiny because of growing awareness that they could be attacked and cause massive disruptions. Read More

Twitter resists subpoena to release user's data without warrant
Twitter is contesting a court order requiring it to turn over private data on a user charged with disorderly conduct during the Occupy Wall Street protests in New York last year. Read More

Police-themed ransomware starts targeting US and Canadian users
A ransomware application that locks computers and asks their owners to pay fines for allegedly violating several laws through their online activity is targeting U.S. and Canadian users, malware experts from security firm Trend Micro said on Wednesday. Read More


WHITE PAPER: Check Point Software

Check Point 3D Security Analysis Report Tool
Reduce security risks with the Check Point 3D Security Analysis tool. This comprehensive security analysis provides an easy-to-read report that summarizes security events, their risks, and remediation. See sample report View Now

Android Trojan copies PC drive-by malware attack
Researchers have noticed one of the first examples of Android "drive-by" malware from an ordinary website, a dangerous type of automatic attack more commonly used to infect Windows PCs. Read More

Will BYOD revive the network-access control idea? Gartner thinks it will
Is the BYOD craze going to bring a revival of NAC, the policy-based network-access control that was hyped a decade ago but didn't end up widely adopted for endpoint security? Read More

MasterCard's PayPass Wallet will span online, mobile, in-store shopping
MasterCard WorldWide announced a digital wallet on Monday that consumers will be able to use for purchases in stores, on the Web and on their mobile phones. Read More

Avaya joins crowded BYOD, MDM field
At Interop this week, Avaya will toss its hat into the rapidly expanding BYOD ring with new software for its policy manager that helps IT get a handle on mobile device management (MDM). Read More

How we tested next-generation firewalls
We tested next generation firewalls by looking at seven separate areas that we felt would be important to network managers trying to deploy these products in enterprise networks. Read More

 
 
 

SLIDESHOWS

Who are tech's highest paid CEOs?
Oracle's Larry Ellison finally ousted from the top spot on our list of highest paid tech execs.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. The Patent Mafia and what you can do to break it up
  2. Verizon not launching voice over LTE anytime soon
  3. BlackBerry 10 OS will have multi-layered security model
  4. Hot products at Interop 2012
  5. How will Cisco COPE with SDNs?
  6. Who are tech's highest paid CEOs?
  7. Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
  8. 25 geeky gifts for Mother's Day
  9. Cisco nemesis Huawei to demo 96-port 100G Ethernet switch
  10. Next-gen firewalls: Off to a good start
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment