Search This Blog

Friday, September 14, 2012

Antivirus programs often poorly configured, study finds

U.S. House votes to extend surveillance under FISA | 12 lines the IT help desk hates to hear

Network World Security

Forward this to a Friend >>>


Antivirus programs often poorly configured, study finds
How securely antivirus software has been configured varies widely between products with users of Microsoft's Security Essentials (MSE) the most likely to run protection using optimal settings, software certification firm OPSWAT has found. Read More


WHITE PAPER: Splunk

Big Data and the Future of Security
Read this white paper to understand the evolving security landscape and how advanced persistent threats and sophisticated malware have fundamentally changed the way security teams must think about these new threats and the tools used for detective controls. Learn More Now!

WHITE PAPER: Sourcefire, Inc.

The Sourcefire FireAMP Vision
Still getting malware infections despite the time and money you've spent on security? Today's malware defenses have an inherent disadvantage in fighting today's threats. Designed for another time they are burdened with legacy constraints that hamper performance and protection. Learn More

U.S. House votes to extend surveillance under FISA
The U.S. House of Representatives has voted to approve the extension by five years of a controversial law, that its critics claim allows for the warrantless surveillance of electronic communications like email and phone calls of not only foreigners but U.S. citizens. Read More

12 lines the IT help desk hates to hear
These 12 questions and requests are guaranteed to draw groans from practically any IT pro in the world Read More

Despite warnings, most states slow to confront corporate ID theft
How easy is it to steal the identity of a business? Just ask Roger Lee Shoss and Nicolette Loisel, two Houston-based attorneys who turned hijacking the identities of publicly traded companies into a cottage industry. Read More


WHITE PAPER: Oracle

Start by Protecting Data at the Source - Your Databases
This IDC white paper presents a proactive approach to data protection, discusses the growing threats to business information, and the impact government regulations have on requiring additional data protections. Learn More!

Gartner: Worldwide Security Spending Will Approach $86 Billion in 2016
Worldwide spending on security is expected to touch the $60 billion mark in 2012, up 8.4 percent from $55 billion in the previous year, according to research company Gartner -- this figure will approach $86 billion in 2016. Read More

Mitigating advanced persistent threats within industrial and critical infrastructure environments
Industrial control systems (ICSs) are the backbone of our industrial and critical infrastructures. As organizations connect their ICSs to the Internet, or integrate them with enterprise applications, the ICSs become vulnerable to cyberattack through everything from common malware to advanced persistent threats (APTs). Mitigating the risk of APTs in industrial control systems takes a special kind of firewall. Read More

Loathe lowdown scareware scams? Lawsuit claims Speedy PC Pro is fraudulent software
Browsing courthouse news can result in reading about "scary" allegations, lawsuits covering everything from people "wrongfully" arrested at a "haunted house" during a paranormal investigation, to a more serious class action lawsuit that, if true, clearly shows the company doesn't comprehend that gamers come in ages. Read More


WHITE PAPER: Silver Peak Systems, Inc.

WAN Optimization eGuide
In this eGuide, articles from Network World examine the maturing WAN optimization market, collect advice from experts and users on how best to implement these products, and look at new trends. Read on to discover how to make the most of WAN optimization in enterprise networks. Read now.

20% of IT staff admit to accessing unauthorised executive data
Almost 40% of IT staff can get unauthorised access to sensitive information, and 20% admit to accessing executives' confidential data, according to research. Read More

Greatest hits: When space and music collide
With space songs from the Beatles to Will-i.am, Jethro Tull, REM and Buck Owens, music and the universe are forever linked. Read More

20 awesome cloud services you've never heard of
Web services are quickly replacing desktop programs for routine tasks such as image editing, spreadsheet creation and more. Here are 20 such services that we think are worth your time. Read More



SLIDESHOWS

Best browsers for Android tablets
Google Play app store, Dolphin, Firefox and Opera Mobile are optimized for smartphones, but how well do they work on tablets?

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Forget iPhone 5: 10 top Apple alternatives
  2. iPhone 5: How does it stack up?
  3. Cisco looks to secure the data center with new releases
  4. Undercover journalist lands job building iPhones at Foxconn, confirms fears about working conditions
  5. Aging hardware drives core router and switch upgrades
  6. T-Mobile woos unlocked iPhone users ahead of iPhone 5 debut
  7. Steve Jobs hologram intros iPhone 5 in zany video parody
  8. First real glimpse of Apple's iPhone 5
  9. iPhone 5 in the enterprise: Pain or gain?
  10. 25 of today's coolest network and computing research projects

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: