Search This Blog

Wednesday, October 17, 2012

Inside Intel, part 1: Evolution of IT security

  How IT Can Prepare for Mobile Forensic Investigations | A Funny Thing Happened On The Way To Encrypting The VA
 
  Network World Security

Forward this to a Friend >>>


Inside Intel, part 1: Evolution of IT security
Like many other companies, processor manufacturer Intel Corp. is having to evolve its information security focus to meet the changes underway in the technology landscape--particularly with the rapid growth of mobile devices and applications and the rise in cloud computing services. Read More


RESOURCE COMPLIMENTS OF: Google

Google Apps for Business
Do more for less with your team using Google Apps. Custom web-based email, calendars, and documents to easily share & work together in the cloud. Start with a free 30-day trial!

RESOURCE COMPLIMENTS OF: LogMeIn

LogMeIn Central: Automate, Monitor and Manage PCs.
LogMeIn lets you Monitor and Manage PCs, deliver patches and updates to multiple PCS simultaneously. Central helps IT deliver seamless support that keeps employees productive and up and running. LogMeIn Central - automate routine tasks and do more. Free Trial

How IT Can Prepare for Mobile Forensic Investigations
If your IT security team must comply with regulations like PCI-DSS or HIPAA, you need to know who accesses your data and what they do with it, even if they're using a mobile device to do it. But performing forensic investigations on mobile devices is trickier than it is on PCs. Read More

A Funny Thing Happened On The Way To Encrypting The VA
Back in 2006 the Department of Veterans Affairs had one of the "mothers of all data breaches". A laptop was stolen that contained 26.5 million records of confidential and/or personally identifiable information (PII). Among the data stolen were the records of over 1 million military members. Of course this kind of incident attracts headlines like moths to the flame. With all of the bad publicity... Read More

Cyberespionage malware 'miniFlame' discovered
Newly discovered spying malware designed to steal data from infected systems was likely built from the same cyber-weaponry factory that produced two other notorious cyberespionage software, Flame and Gauss, a security vendor says. Read More


WHITE PAPER: Websense, Inc.

Defending Against Today's Targeted Phishing Attacks
Although email remains highly vulnerable to foul play, security continues to rely heavily on principles and technologies that are more than a decade old. Organizations need to take a new look at email security, particularly as newer, more targeted phishing attacks proliferate. Read Now!

Using security metrics to measure human awareness
It's been said that security is hard to measure. Producing measurable results around a lack of problems or incidents is challenging. But the field of security metrics has evolved considerably in recent years, giving security managers more resources to make the case for investing in security programs and technologies. Read More

FBI warns Loozfon, FinFisher mobile malware hitting Android phones
The Internet Crime Complaint Center (IC3) has warned Android users that a number of malware attacks have been plaguing Android smartphone users. The IC3 said some of the latest known versions of mobile malware taking aim at Android users are Loozfon and FinFisher. MORE: The 10 most common mobile security problems and how you can fight them The group provided an outline of the nasty stuff: Read More

Facebook removes two-factor authentication mobile numbers from search
Facebook users who have associated a mobile phone number with their accounts in order to enable the "Login Approvals" security feature can no longer be found on the website based on those phone numbers, the company said Monday. Read More


WHITE PAPER: Websense, Inc.

A 3-Step Plan for Mobile Security
Mobility is here, and it brings with it new productivity opportunities - and associated security risks. This paper identifies specific countermeasures and management controls that you can use to establish a mobile security strategy that encompasses both corporate and personal devices. Read Now!

Cyberthieves loot $400,000 from city bank account
Burlington, Wash. officials have notified hundreds of employees and residents that their bank account information was compromised last week when hackers broke into city systems and stole more than $400,000 from a city account at Bank of America. Read More

UK hacker Gary McKinnon wins extradition battle
Gary McKinnon, indicted in 2002 on charges of hacking into U.S. government computers, will not be extradited to the U.S., the U.K. Home Secretary Theresa May said on Tuesday. Read More

INSIDER
Free technology for the taking
It's like the store doors just opened on Black Friday and you have your pick of free stuff. Read More

University hospital putting in place BYOD mobile strategy
A teaching hospital based in Israel, Hadassah University Hospital, has devised a plan to be able to support the "bring your own device" (BYOD) wishes voiced by medical staff and students clamoring to use their own mobile devices, while also bringing to bear management and security controls. Read More

Antivirus evaluation puts Kaspersky and Symantec on top
Dennis Technology Labs released the results of its latest round of antivirus tests seeking to determine the effectiveness of several commercial anti-malware products, with Kaspersky and Symantec coming out on top. Read More

 
 
 

SLIDESHOWS

25 essential business apps for iPhone 5
The iPhone 5 is here, so it's time to start loading it up with apps.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Why Apple should price the iPad Mini at $199
  2. Time to disable Java again
  3. Cisco looking to buy Citrix ADCs?
  4. FBI warns Loosfon, FinFisher mobile malware hitting Android phones
  5. Cisco releases OpenStack distribution
  6. Microsoft Windows 8 brings malware improvements, says antivirus researcher
  7. .xxx to launch porn search engine
  8. 2012 tech industry graveyard
  9. Apple iPhone 5 reviewers butt of Saturday Night Live skit jokes
  10. Microsoft Surface tablets to launch Oct. 26; pricing still unknown
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: