Search This Blog

Tuesday, November 06, 2012

Microsoft Trustworthy Computing finally pays off in a big way

  Coke hacked by Chinese and kept it a secret | Microsoft provides fusion center technology & funding for surveillance
 
  Network World Security

Forward this to a Friend >>>


Microsoft Trustworthy Computing finally pays off in a big way
Back in 2002, then-Microsoft CTO and senior vice president Craig Mundie authored a whitepaper on what would become the framework of the company's Trustworthy Computing program. It would be built around four pillars that all Microsoft products would embrace: Security, Privacy, Reliability and Business Integrity. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

LogMeIn Central: Automate, Monitor and Manage PCs.
LogMeIn lets you Monitor and Manage PCs, deliver patches and updates to multiple PCS simultaneously. Central helps IT deliver seamless support that keeps employees productive and up and running. LogMeIn Central - automate routine tasks and do more. Free Trial

WHITE PAPER: FireEye

Intensified Dangers of Email-Based Attacks
Keep your organization safe by staying educated. Download this report to learn more about identifying and preventing cyber attacks. Learn more.

Coke hacked by Chinese and kept it a secret
"I'd like to buy the world a Coke and keep it company"... it's the real thing according to an old musical slogan . . . and it was the real thing when Coca-Cola was targeted by Chinese hackers in 2009. Once upon a time, Coca-Cola wanted "perfect harmony" and even cokes for everyone in the world, including polar bears and penguins, but that meant sharing soft drinks and not company secrets. Read More

Microsoft provides fusion center technology & funding for surveillance
The ACLU's Privacy SOS presented a great article about why "it's time to pull the plug on fusion centers!" While it's well-known that Microsoft has a great and long-standing relationship with government, law enforcement, and intelligence agencies, Privacy SOS pointed out the interesting tidbit that Microsoft helps pay for fusions centers. Read More

Smart meters not so clever about privacy, researchers find
Researchers at the University of South Carolina have discovered that some types of electricity meter are broadcasting unencrypted information that, with the right software, would enable eavesdroppers to determine whether you're at home. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

DARPA seeks smart camera that would blend visible, infrared images into a single shot
Researchers with the Defense Advanced Research Projects Agency want to build a clip-on or helmet mounted smart camera system that can meld visible, near infrared, and infrared images into a single shot under all weather and visibility conditions. Read More

Hackers claim attacks against ImageShack, Symantec, PayPal, other websites
Different hacker groups claim to have breached servers belonging to ImageShack, Symantec, PayPal and other organizations. Read More

DHS official suggests sharing IT resources to survive hacks
Groups of companies in the same industry could mitigate the effects of cyberattacks by pooling infrastructure resources and working together on security issues, a senior official in the U.S. Department of Homeland Security has suggested. Read More


WEBCAST: Dell SonicWall

Why First Generation Firewalls Aren't Making the Grade
In this exclusive webinar, learn from Dell-SonicWALL's Patrick Sweeney, how today's Next-Generation Firewalls allow businesses to scale their network security to meet the demands of emerging threats and new technology trends, while ensuring performance to meet key business objectives. Resister Now!

Security through obscurity: How to cover your tracks online
From Tor to steganography, these six techniques will help obscure the data and traces you leave online Read More

Passwords are the weak link in IT security
Three decades into the digital revolution, passwords are still complicated, ineffective and a drain on IT's resources. What gives? Read More

Security Manager's Journal: A reality check for the department's maturity
An assessment of the information security department shows that it has a lot of growing up to do yet. Read More

 
 
 

SLIDESHOWS

First look: Windows 8 Surface RT
Surface RT, the Microsoft-built tablet/notebook, offers a sleek design and sturdy feel.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 'World's largest' telecom deal turns out to be a dud
  2. iPhone 6 rumor rollup for week ending Oct. 26
  3. Scott Forstall and Jony Ive refused to attend each other's meetings
  4. A vendor-independent comparison of NoSQL databases
  5. SJSU didn't bid Cisco project
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. .xxx to launch porn search engine
  8. AMD announces fastest 16-core server chips as ARM future looms
  9. How the Presidential election will impact IT outsourcing
  10. The 5 worst mobile threats of 2012
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: