Search This Blog

Friday, July 20, 2012

Microsoft, Juniper, others in coding consortium issue guidelines for safer applications

The weirdest, wackiest and coolest sci/tech stories of 2012 (so far!) | Securing the new data center

Network World Compliance

Forward this to a Friend >>>


Microsoft, Juniper, others in coding consortium issue guidelines for safer applications
An industry consortium dedicated to assuring the security of software has issued guidelines to lower the risk that vulnerabilities that could be exploited by attackers will wind up in finished code. Read More


WHITE PAPER: McAfee

McAfee Next Generation Network IPS White Paper
This paper examines the goals organizations need to set for their security controls and management capabilities in order to harden network defenses against targeted attacks and respond more effectively to those that initially succeed. Read now.

RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant remote support with LogMeIn Rescue
With LogMeIn Rescue, you can start a support session in just 60 seconds. Connect 24/7 to PCs, Macs, smartphones and tablets. You'll get in, solve the problem and save the day without ever leaving your desk. Try it free today.

The weirdest, wackiest and coolest sci/tech stories of 2012 (so far!)
From Apple to NASA and Stuxnet to robots, it's been a busy year Read More

INSIDER
Securing the new data center
It's hard enough to secure resources when they are bound to a physical box, but the game changes when servers are virtualized and start to move around, not only to other servers in the data center, but also to off-premise cloud facilities. Read More

Just linking could get you 10 years in jail
UK citizen Richard O'Dwyer faces the possibility of ten years in the slammer for having a site that linked to pirated content Read More


WHITE PAPER: Silver Peak Systems, Inc.

WAN Optimization eGuide
In this eGuide, articles from Network World examine the maturing WAN optimization market, collect advice from experts and users on how best to implement these products, and look at new trends. Read on to discover how to make the most of WAN optimization in enterprise networks. Read now.

Victim of half-million-dollar cybercrime tells tale of fighting back
It started out as an ordinary workday for Michelle Marsico, who runs a business based in Redondo Breach, Calif., handling escrow funds for clients in real estate. But when she went online to check the funds-transfer activity in her commercial bank account, she found to her horror that it had been cleaned out by cybercrooks to the tune of almost half a million dollars. Read More

First look: Firefox 14
We check out some of the Mozilla Firefox 14 browser's new features Read More

Check Point: Now you can run up to 250 virtual security systems on 1 gateway
Check Point Software Technologies Monday unveiled a gateway it says will let businesses radically consolidate the vendor's firewall/VPN, intrusion-prevention and other security products as "virtual systems" on a single appliance. Read More


WHITE PAPER: Sourcefire, Inc.

The Sourcefire FireAMP Vision
Still getting malware infections despite the time and money you've spent on security? Today's malware defenses have an inherent disadvantage in fighting today's threats. Designed for another time they are burdened with legacy constraints that hamper performance and protection. Learn More

The worst security snafus of 2012 – so far
Could things really be this bad? From the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches, security snafus have ruled the first half of 2012. Here's a look at some of the worst snafus month-by-month. Read More

Cisco acquires Virtuata to secure virtual-machine data
Cisco has acquired Virtuata, a privately held developer of technology for securing virtual-machine data in multi-tenant data centers, the company said Monday. Read More

Open source offense could be our best defense against cyberattacks
A core dilemma for IT today is how to properly protect the organizations' information systems and assets given security tools often seem like a black hole sucking down both time and money. But a strong defense doesn't have to be expensive, and a good place to start is assessing what information is publicly available and figuring out how to safeguard it from attack. Read More

Oracle to release 88 security fixes
Oracle is planning to deliver 88 security fixes next Tuesday for a wide range of its products, according to a pre-release announcement posted to its website on Thursday. Read More

9 itsy-bitsy, teeny-weenie computers
Read More



SLIDESHOWS

9 itsy-bitsy, teeny-weenie computers
Here are eight products, and a project in development, that are leading the effort to make PCs small enough to slip into your pocket.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. IT groups petition Apple to "fix" Bonjour protocol
  2. New Office has compelling enhancements but also big holes
  3. Are firewalls dead?
  4. Perfect storm for managed service, co-lo and cloud industries
  5. Cloud platform comparison
  6. Earliest known photos of an Apple iPad prototype
  7. HOPE 9: Whistleblower Binney says the NSA has dossiers on nearly every U.S. citizen
  8. NSA whistleblower Drake: You're automatically suspicious until proven otherwise
  9. Victim of half-million-dollar cybercrime tells tale of fighting back
  10. Gartner: cloud putting crimp in traditional software, hardware sales

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: