Search This Blog

Monday, May 21, 2012

US report defines China’s considerable cybersecurity, space-based threats

Windows 8 Security: What's New | Cyber spies exploiting Java, Flash flaws

Network World Security

Forward this to a Friend >>>


US report defines China's considerable cybersecurity, space-based threats
China continues to be a significant military and cybersecurity threat that will require the United States to adapt and change to counter such threats. Those were but a couple of the conclusions from the Department of Defense 's wide-ranging "Military and Security Developments Involving the People's Republic of China 2012" annual report to Congress about the status of China and its burgeoning power... Read More


WHITE PAPER: Fortinet

Next-Generation Security for Enterprise Networks
Since the concept of a 'next-generation firewall' was introduced several years ago by Gartner, many network security vendors have introduced their own next-generation firewalls to address this product category - but with varying results. View Now

WHITE PAPER: Check Point Software

Check Point 3D Security Analysis Report Tool
Reduce security risks with the Check Point 3D Security Analysis tool. This comprehensive security analysis provides an easy-to-read report that summarizes security events, their risks, and remediation. See sample report View Now

Windows 8 Security: What's New
When Windows 8 comes out later this year, the new Start screen and Metro-style apps will likely be the first changes you'll notice, but those aren't the only things that are new. Microsoft is also making some serious security enhancements to help keep your system safer and to improve Windows' ability to combat viruses and malware. It just may be the biggest improvement to Windows security yet. Read More

Cyber spies exploiting Java, Flash flaws
Such activity is often paid for, or sanctioned by, government agencies Read More


WHITE PAPER: Centage Corporation

Centage/IOMA Budgeting Survey: Benchmarks & Issues
How are other financial professionals dealing with the issues you face? This report offers you an inside peak into what the minds at over 200 financial executives are thinking and doing to impact their own bottom line. Learn more.

7 Tips for Establishing a Successful BYOD Policy
If you haven't developed a corporate Bring Your Own Device policy, or if the one you have is out of date, these tips will help you address device security, IT service, application use and other key components of an effective BYOD policy. Read More

Android hackers honing skills in Russia
The malware business growing around Google Android -- now the leading smartphone operating system -- is still in its infancy. Today, many of the apps built to steal money from Android users originate from Russia and China, so criminal gangs there have become cyber-trailblazers. Read More


WHITE PAPER: FireEye

Why They are Successful and How to Stop Them
Why is spear phishing on the rise? Quite simply, it works. Traditional securitydefenses simply do not stop these types of attacks. Learn more in the FireEye Advanced Threat Protection KnowledgeVault. Learn more.

Will voluntary cyber threat sharing plan cast doubt over CISPA?
The question of whether CISPA is really necessary might arise in the wake of a Department of Defense announcement last week that as many as 1,000 defense contractors -- and possibly thousands more -- may voluntarily join an expanded program of sharing classified information on cyber threats with the federal government. Read More

US firms over-reliant on firewalls to defend against DDoS attacks
More than half of US businesses still rely on conventional firewalls or intrusion prevention systems to shield themselves from the scourge of DDoS attacks, a survey by services firm Neustar has found. Read More

Equifax Eyes Are Watching You--Big Data Means Big Brother
As one of three credit bureaus in the United States, Equifax keeps financial data on every adult in America, plus people in 16 other countries. But the company knows much more than just what goes into an old-fashioned credit score. Read More

Smartphone security is heading for 'apocalypse'
The meteoric rise in the smartphone market is creating a dangerous vulnerability in smartphone security - one that may not be patched until the problem expands into what has been dubbed an "apocalypse." Read More



SLIDESHOWS

10 ways to make Android faster, more productive and more secure than iPhone
iPhone users love to brag about their phones. Yet, for many users, Android is clearly the superior platform.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Android, Samsung top smartphone sales, topping Apple's iPhone
  2. Jailbreak: Dirty word disappears from Apple iTunes store
  3. Ethernet switching gets specialized
  4. 10 reasons your Wi-Fi speed stinks (and what you can do about it)
  5. Geena Davis wins major telecom award
  6. Wozniak reveals why Steve Jobs loved secrecy
  7. 7 ways to mask your Internet identity
  8. iPhone 5 said, again, to have 4-inch display
  9. Tech managers aren't doing a good job developing IT talent
  10. Cisco mobility bundles target BYOD, mobile virtual desktop

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: