Search This Blog

Friday, August 03, 2012

Heated debate over stalled cybersecurity bill pits pro-defense Democrats vs. hands-off Republicans

  DEFCON Kids: Hacking roller coasters and the power grid with cell phones | The NSA's acceptance of hackers at Defcon marks progress for information security
 
  Network World Security

Forward this to a Friend >>>


Heated debate over stalled cybersecurity bill pits pro-defense Democrats vs. hands-off Republicans
The cybersecurity bill that went down Thursday to legislative defeat shows the deep schism in Congress that had Democrats siding with traditional national-security defense hawks, and Senate Republicans, who toppled the bill, largely siding with businesses that didn't want government foisting new regulations on them. Read More


WHITE PAPER: Cisco

Cisco Bring Your Own Device
This paper explores the challenges mobile devices create for IT, offers key considerations before adopting a BYOD strategy and highlights a comprehensive architecture from Cisco that enables freedom of choice for users while affording IT security and control. Learn more.

WHITE PAPER: HP

Bring Your Own Mobile Devices to School
In today's educational environments, more and more students, guests, and faculty are bringing in their own Wi-Fi devices into the school's network. This paper discusses the challenges and solutions IT administrators are facing and how to address the security and management of the multiple devices being introduced into the wireless/wired network. Learn more.

DEFCON Kids: Hacking roller coasters and the power grid with cell phones
When you think about hacking conferences with about 15,000 hackers attending, 8-year-old kids might not be your first thought. Yet Def Con Kids was so amazing that I cannot encourage you enough to enroll your kids next year. Read More

The NSA's acceptance of hackers at Defcon marks progress for information security
At last year's GFIRST summit in Nashville, I participated in a panel discussion on the role of threats to federal information systems. All of us on the panel held differing views regarding individual types of threats; sometimes the audience gave our responses a polite round of applause, and other times, mild groans and the occasional hiss were heard when a panelist said something particularly controversial.... Read More

Why we don't need Internet rights but do need a level playing field
On July 2 this year a manifesto appeared called the "Declaration of Internet Freedom," which you can find at internetdeclaration.org/ (I quote the URL for reasons that will be clear in a minute). Read More


WHITE PAPER: Motorola

WiNG 5 Wireless LAN: Delivering Better Quality of Experience
Can your wireless network infrastructure handle the growing numbers of mobile devices taking significant bandwidth bites out of your network? The good news is that with smart, cost-effective wireless infrastructure investments, not only can you scale quickly to secure the growing number of devices you serve, but also optimize their performance. Learn More.

Facebook, Twitter accounts of Yankees, other teams compromised
The official social media accounts of several Major League Baseball teams were compromised Thursday, leading to some embarrassing messages appearing on the Facebook and Twitter accounts and highlighting the risks social media sites can present for the public image of businesses. Read More

Encrypt keystrokes to foil keylogger malware
According to the Verizon RISK Team, keylogger applications were present in almost half (48%) of all breaches that Verizon investigated or analyzed in 2011. Here's one solution that encrypts keystrokes and uses an out-of-band channel to safely deliver keystrokes to intended applications. Read More

Security Threat Landscape - August 2012
Keith Shaw chats with Derek Manky from Fortinet about the latest security threats. This month, they talk about SCADA, exploits in Microsoft Gadgets and Sidebar, and looming mobile exploits via Android and other platforms. Read More


WHITE PAPER: Xirrus

Tablets in the Enterprise
Tablets are replacing laptops at lightning speed. Whether company-issued or part of the BYOD phenomenon, the increased use of smart devices has resulted in a dramatic shift in network traffic with an emphasis on wireless. This paper explains how to predict Wi-Fi demands and architect a best-fit wireless network strategy for your environment. Learn more.

Will suborbital space travel explode? It depends
The Federal Aviation Administration says that depending on a number of wide-ranging variables, the commercial use of reusable spacecraft that touch the threshold of space but don't actually enter it could grow significantly over the next ten years to be worth as much as $1.6 billion. But there are a ton of caveats. Read More

As Dad helps control Curiosity, family will live on 'Mars time'
Once Curiosity lands on Mars, NASA lead flight director David Oh and his colleagues responsible for the rover's operation will be required to live their earthly lives on Mars time. Oh's wife, Bryn, and their three children - Braden, 13, Ashlyn, 10, and Devyn, 8 -- will do so as well, by choice and in the spirit of adventure. Read More

NASA Mars Curiosity mission madness
A quick look at the NASA Mars Science Laboratory and Curiosity rover mission Read More

 
 
 

SLIDESHOWS

12 new network features in Windows 8
There are a bunch of new and impressive administrative features designed to increase network support, reliability, performance, and security.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Ask an IT support pro: Why I hate live chat
  2. Serval: Princeton researchers tout "Layer 3.5" Internet upgrade
  3. Nokia preps to sell Qt, but not before Elop screws it up
  4. Cisco stays the network virtualization course
  5. Wikipedia-sponsored 'pilot study' lauds Wikipedia accuracy
  6. Apple initially wanted an iPhone with shaped glass, deposition reveals
  7. 'Anonymous' turns in hacker who targeted children's charity
  8. Earliest known photos of an Apple iPad prototype
  9. Android news and rumor roundup for week ending Aug. 3
  10. French T-shirt company relenting in face of Anonymous threats
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: