Search This Blog

Friday, August 03, 2012

Don't buy that security software!

Security soiree: Microsoft's BlueHat Prize contest | IBM attempts to redefine the IPS

Network World Compliance

Forward this to a Friend >>>


Don't buy that security software!
Open source doesn't have to mean free of cost, but thanks to the generosity of open source developers many thousands of great applications are free. Why spend money when you don't have to? Though if you like and depend on an app, nothing says thanks like clicking the "Donate" button. Read More


WHITE PAPER: Oracle

Experience a Smooth and Swift Backup
Virtually every company, regardless of size or industry, needs data archive capabilities. Datacenter administrators across all industry segments face similar archive challenges. Learn More!

WEBCAST: IBM

Changing the Competitive Dynamics of the Business
Date/Time: June 5, 2012, 11:00 a.m., EDT, 4:00 p.m. BST / 3:00 p.m. UTC Please join us for this webcast, as Dr. Barry Devlin, Founder and Principal, 9sight Consulting, describes what operational analytics can do for your business and reviews an architectural approach that will enable you to make it a reality. Register Now

Security soiree: Microsoft's BlueHat Prize contest
Microsoft's Trustworthy Computing Group recognizes securityresearchers for work on ROP Read More

IBM attempts to redefine the IPS
IBM Tuesday introduced what it's calling a "next generation" intrusion-prevention system (IPS), an offering that not only is designed to stifle network-based attacks, but adds application-level controls and URL filtering capabilities typically found in separate products such as Web security gateways. Read More

Black Hat: Shark-bitten security researcher takes another chomp out of Oracle database
A researcher scored again against Oracle's database by demonstrating at the Black Hat security conference Thursday an exploit that would allow him to take control as an administrator. Read More

Apple's first security talk at Black Hat disappoints
That Apple discussed product security at all was a welcomed sign, however Read More


WEBCAST: SAP

Automate Your Partners for Efficient E-Business
Join IDC's Maureen Fleming and SAP for an insightful Webcast on the different approaches companies are taking to B2B integration and how you can ask the right questions to reassess your B2B approach. Learn More

French T-shirt company relenting in face of Anonymous threats
Shadowy hacktivist group Anonymous last night issued a call to its members to attack an online T-shirt company based in France that had registered the Anonymous slogan and logo under French law. That small company, Early Flicker, now seems to be caving to demands from Anonymous. Read More

INSIDER
The state of network security
Network security is still as necessary as it was 15 years ago when the Black Hat Conference was first beginning. Sure the players have changed and the sophistication, but it is a classic good vs. evil scenario still. Read More

Global Payments: data breach cost a whopping $84.4 million
Global Payments, which back in the spring reported a data breach in which information associated with an estimated 1.4 million payment cards was stolen, has revealed that expenses associated with investigations, fines and remediation has hit $84.4 million. Read More

Dropbox gets a black eye in spam attack
The Dropbox file-sharing service suffered a setback in its efforts to move into the enterprise more forcefull after being hit by a spam attackthat stemmed from the breach of an employee's account. Read More


WHITE PAPER: Silver Peak Systems, Inc.

WAN Optimization eGuide
In this eGuide, articles from Network World examine the maturing WAN optimization market, collect advice from experts and users on how best to implement these products, and look at new trends. Read on to discover how to make the most of WAN optimization in enterprise networks. Read now.

Can Big Data Help Universities Tackle Security, BYOD?
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data analytics technologies to mine the data in their logs and improve their security footing. Read More

Researcher creates proof-of-concept malware that infects BIOS, network cards
Security researcher Jonathan Brossard created a proof-of-concept hardware backdoor called Rakshasa that replaces a computer's BIOS (Basic Input Output System) and can compromise the operating system at boot time without leaving traces on the hard drive. Read More

NSA chief asks hackers at Defcon for help securing cyberspace
National Security Agency Director General Keith B. Alexander addressed the attendees of the Defcon hacker conference in Las Vegas on Friday and asked for their help to secure cyberspace. Read More

13 awesome and scary things in near Earth space
Space debris, comets, asteroids and cool clouds highlight Earth space news Read More



SLIDESHOWS

12 new network features in Windows 8
There are a bunch of new and impressive administrative features designed to increase network support, reliability, performance, and security.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 'Anonymous' turns in hacker who targeted children's charity
  2. Apple initially wanted an iPhone with shaped glass, deposition reveals
  3. Verizon Wireless to pay fine for allegedly blocking tethering apps
  4. Outlook.com review: Microsoft turns mail into mini-Facebook
  5. Google cloud vs. Amazon cloud: How they stack up
  6. Microsoft kissing Hotmail goodbye
  7. Microsoft code contains the phrase 'big boobs'
  8. 12 new network features in Windows 8
  9. New data center design boasts 'world's most efficient cooling system'
  10. Rackspace, HP go all in with OpenStack

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: