Search This Blog

Friday, January 04, 2013

Google finds unauthorized certificate for google.com domain, scrambles to protect users

  Six Security Threat Predictions for 2013 | Cloud security to be most disruptive technology of 2012
 
  Network World Security

Forward this to a Friend >>>


Google finds unauthorized certificate for google.com domain, scrambles to protect users
Google has taken steps to close potential security holes created by a fraudulent certificate for its google.com domain, discovered in late December. Read More


WEBCAST: CDW Corporation

Unified Threat Management: A Better Approach to Security
In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More.

WHITE PAPER: SafeNet Inc

Assessing the True Cost of Strong Authentication
Cloud-based services are increasingly becoming an integral part of the enterprise, precisely because they lower costs and management overhead while increasing flexibility. Learn More

Six Security Threat Predictions for 2013
Six Security Threat Predictions for 2013 From: networkworld Views: 0 0 ratings Time: 00:00 More in Science & Technology Read More

Cloud security to be most disruptive technology of 2012
The Security for Business Innovation Council, comprised of IT security professionals from 19 companies worldwide, called cloud computing the main disruptive force for 2013. In its report, "Information Security Shake-Up," the group said it was evident many organizations are preparing to move more business processes to the cloud. This year, it will even be "mission-critical apps and regulated data" consigned to the cloud. Read More


WHITE PAPER: Trusteer

Dealing with Advanced and Targeted Attacks
This whitepaper explains how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints. It reviews the evolution of advanced targeted attacks and the various approaches used to address them. Learn More.

Gartner: Cloud computing, mobile ushering in "major shift" for enterprise security practices
Gartner Thursday held forth on what it expects to be the top security trends for 2013, citing the rise of cloud computing, social media and employees bringing their own devices to work as among the forces likely to produce radical changes in how enterprises manage IT security. The market research firm also says the "major shift" expected in IT security in 2013 will shake up established IT security vendors as newer players in cloud and mobile challenge them. Read More

How to Get a Grip on Data With 'Information Superiority'
To make more efficient use of data and improve data protection, take a holistic approach to information governance-one that focuses attention on the most sensitive data while removing impediments to sharing. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Security lessons from 2012
More DDoS attacks on banks, cyberwarfare, and targeted attacks could well be in store in 2013, security experts warn. Read More

Big Space: There are at least 100 billion planets in our galaxy alone
Astronomers have, since they could see stars a night, tried to figure out how many planets were in the sky - and the latest count from scientists is massive - 100 billion just in our own Milky Way galaxy. Read More

How to talk security so people will listen (and comply!)
Sure you want users to comply with security edicts, but would you phish your own employees or share your company's hack history? At least some CIOs say yes. Insider (registration required) Read More

Website of US-based gas turbine maker also rigged with new IE exploit
The attackers who recently infected the website of the Council on Foreign Relations (CFR) with an exploit for an unpatched vulnerability in Internet Explorer, also targeted the website of Capstone Turbine Corporation, a U.S.-based manufacturer of gas microturbines used for power generation, heating and cooling, according to a security researcher. Read More

 
 
 

SLIDESHOWS

33 Best & Worst Celebrity Tech Moments of 2012
Playing Steve Jobs, Gaga over social networking and more tech endorsements than you can shake an iPhone at.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Why Amazon's apologies all sound the same
  2. Technologies to watch 2013: Windows Server 2012 cannot be ignored
  3. Microsoft issues quick fix for critical zero-day hole in IE
  4. Technologies to watch 2013: Cisco products, more maturity for SDNs
  5. Canonical raises curtain on Ubuntu for smartphones
  6. 9 common Spanning Tree mistakes
  7. Best IT resolutions for 2013
  8. 7 deadly sins of cloud computing
  9. Technologies to watch 2013: Gigabit Wi-Fi
  10. Apple's fix for Do Not Disturb 2013 woes: Wait until Jan. 7
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: