Tuesday, October 09, 2012

House Intelligence Committee report blasts Huawei, ZTE as threats to U.S. national security

  The ugly, scary year in Apple iPhone and iPad thefts | Spear-phishers lie in wait at 'watering hole' websites
 
  Network World Security

Forward this to a Friend >>>


House Intelligence Committee report blasts Huawei, ZTE as threats to U.S. national security
China-based Huawei and ZTE pose a national-security threat to the U.S. because of spying and stealing of data that could be done on behalf of the Chinese government through any network based on vendors' network service provider gear, according to an investigative report issued Monday by the U.S. House Intelligence Committee. Read More


RESOURCE COMPLIMENTS OF: Gartner, Inc.

Future-proof your IAM strategy
The Gartner Identity & Access Management Summit 2012, December 3-5, in Las Vegas, NV, will help you retool your IAM strategy to meet the challenges brought on by the nexus of cloud, social, mobile and information revolution. Save $300 on the standard registration rate using priority code IAMPA1. Register today at http://www.gartner.com/us/iam or call 1 866 405 2511. To view a complimentary sample Gartner IAM summit session, visit http://gartnerinfo.com/iam7lg/

WHITE PAPER: FandoTech

Understanding Recovery vs. Continuance
Understanding the difference between "disaster recovery" and "business continuance" is imperative to finding the right-fit backup, recovery and restoration solution for any organization. Consider the 4 business factors that drive RPO and RTO requirements essential to surviving unplanned outages. Learn more.

The ugly, scary year in Apple iPhone and iPad thefts
Apple iPhones and iPads have become the new must-have item -- for thieves. Read More

Spear-phishers lie in wait at 'watering hole' websites
Targeted spear-phishing attacks are going after not just individuals but entire websites that function as "watering holes" for groups of people with focused interests, according to security company Websense. Read More


WEBCAST: Teradata

Big Data Done Right
View this on-demand webcast to learn how to reap the benefits of big data through a practical unified architecture; how to improve performance with in-memory technology; and how to lower costs and increase scalability through cloud computing. Register now.

Symantec targets partners to develop better mobile security
To broaden its mobile-device security effort, Symantec today said it would set up a partner program to encourage third-party app developers to build-in the type of security controls, such as enforced encryption, used in the Symantec app-management and security product. Read More

RSA simple password-protection to stop hackers
RSA, the security division of EMC, today announced a security product intended to protect simple passwords stored within businesses for authentication purposes, by splitting these passwords in two pieces kept separately, in theory making it harder for hackers to get hold of them. Read More


WHITE PAPER: Blue Coat Systems

Optimize and Secure Cloud, SaaS, BYOD, and Social Media
Today's threat landscape has migrated to the web causing many security professionals to prevent direct Internet access at the branch. But with new cloud-based security solutions from Blue Coat you can re-architect your network to embrace the Internet – safely – and optimize application performance. Learn more.

Mass-distributed malware reaches critical mass
Malware purveyors are now primarily in the mass-distribution business, confirms the Security Engineering Research Team (SERT) at managed security services provider Solutionary. Read More

Cyberattacks in U.S. cost an average $8.9 million annually to clean up, study says
According to a survey of 56 corporate and governmental organizations conducted by the Ponemon Institute, the average amount they paid for all the costs associated with cyberattacks was $8.9 million during the past year. That's up 6% from the previous year's study. Read More

Cisco said to cut ties with China's ZTE
Cisco has reportedly cut ties with Chinese telecom vendor ZTE after allegations that ZTE sold Cisco gear to Iran. Read More

Security Manager's Journal: I hired a hacker
Our manager has some cleaning up to do after a third party's penetration testing uncovers some disturbing findings. Read More

 
 
 

SLIDESHOWS

Top 10 cloud jobs
Researchers at Dice.com have crunched the numbers to come up with a list of the top 10 most available jobs in the cloud.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. '60 Minutes' torpedoes Huawei in less than 15 minutes
  2. Cloud careers: It's a seller's market
  3. Microsoft's strange Microsoft Surface advertisement
  4. Top 10 cloud-related job titles
  5. Cisco acquires virtual network controller maker vCider
  6. The ugly, scary year in Apple iPhone and iPad thefts
  7. .xxx to launch porn search engine
  8. Interop: Don't sweat 802.11ac Wi-Fi -- because 802.11ad will knock your socks off
  9. Major enhancements coming for Cisco Catalyst 6500
  10. Microsoft Surface tablets to launch on Oct. 26; pricing still unknown
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment