Search This Blog

Friday, December 07, 2012

12 useful websites for IT security

  Government board aims to revamp decrepit US security classification system | Why did BlackBerry blacklist the 'Pooh' gang?
 
  Network World Security

Forward this to a Friend >>>


12 useful websites for IT security
From Microsoft and Cisco to the National Institute of Standards and Technology, we look at some of the most useful IT security websites Read More


RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Government board aims to revamp decrepit US security classification system
The US government's overly complicated way of classifying and declassifying information needs to be dumped and reinvented with the help of a huge technology injection if it is to keep from being buried under its own weight. That was one of the main conclusions of a government board tasked with making recommendations on exactly how the government should transform the current security classification... Read More

Why did BlackBerry blacklist the 'Pooh' gang?
A report surfaced earlier this week contending that BlackBerry OS 10 will include a list of 106 prohibited passwords designed to prevent the clueless from choosing the likes of 123456, blackberry, or the ever-popular "password" as their password. However, a RIM spokesman told me today that the list actually applies to BlackBerry ID universally, not only the upcoming operating system, and "has been... Read More


WHITE PAPER: Capella University MP

Explore Capella University IT/MBA Programs
As an accredited university, Capella University offers online graduate degrees in business, education, human services, information technology, psychology, public health, and public safety and undergraduate degrees in business, information technology, and public safety. Learn More.

Gartner: Growth in cloud computing to shape 2013 security trends
It's the time when predictions for the new year run high, and when it comes to IT security, Gartner analysts are predicting that 2013 is going to be about expansion of cloud computing and the struggle by the enterprise to achieve appropriate security for it. Read More

12 Scams of Christmas and How to Avoid Them
'Tis the season for online scams. Here are 12 of the most dangerous scams you're likely to see this holiday season. Read More


WHITE PAPER: Brocade

Scaling Out Data Centers
Organizations of all sizes are facing daunting challenges as they struggle to adapt their data center networks to new technologies and applications. The move toward cloud architectures in particular is demanding a high-performance network interconnect that can host servers potentially numbering in the thousands. Read Now

ITU says "network outage" after website cyberattack disrupted Dubai conference
The International Telecommunication Union (ITU), the UN body that has played a standards-setting role for global telecommunication networks over the decades, Wednesday night suffered a website attack that severely disrupted a conference to discuss its Internet influence. Read More

How the fiscal cliff affects IT
Since the election, the political news cycle has revolved around the impending "fiscal cliff," a perfect storm of tax increases and government spending cuts set to take effect on Jan. 2, 2013. Although the IT industry may not have paid much attention, it's just as susceptible to the policy changes as the rest of the economy. Read More

Best practices to close the door to spear-phishing attacks
Security firm Trend Micro has identified spear-phishing emails as a top vector for allowing advanced persistent threats (APTs) onto company networks. Attackers use personal information to gain a victim's confidence and then zap him or her with malware that can scout for and exfiltrate confidential data. Share these best practices with your colleagues to "avoid the spear." Read More

US, European law enforcement take down $3M high-end online fraud scheme
The US Department of Justice, working with a team of international law enforcement officials today said it took out an online fraud scheme that sold some $3 million worth of all manner of high-end items such as cars, motorcycles and boats on eBay, Cars.com, AutoTrader.com and CycleTrader.com. Trouble was, none of the high-end items really existed. Read More

 
 
 

SLIDESHOWS

10 cloud predictions for 2013
2013 is the year that companies need to implement a serious cloud strategy that puts certain workloads in the public cloud and retains other workloads in-house.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. #DroidRage stunt brings Microsoft a world of hurt
  2. McAfee in Guatemalan jail cell, still 'blogging'
  3. A gift guide to please any geek ... 25 years ago
  4. 12 useful websites for IT security
  5. 'Everyone in US under virtual surveillance'
  6. Google Ingress: How to save the world with your Android phone
  7. Gartner: Amazon, HP cloud SLAs are 'practically useless'
  8. Cisco Catalyst 6500 vs. Cisco Nexus 7000
  9. 12 scams of Christmas and how to avoid them
  10. 2013 IT salaries: 15 titles getting the biggest pay raises
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: