Search This Blog

Thursday, March 07, 2013

Firewalls: The security tool we love to hate

  The Facebook privacy conundrum: Desire for more confidentiality grows but so does amount of personal data | How to blunt spear phishing attacks
 
  Network World Security

Forward this to a Friend >>>


Firewalls: The security tool we love to hate
Firewalls, quick what do you think of? For many in the security industry and IT in general we think "are they still around, do we still use them?" But the fact is in a recent study by Wendy Nather of 451 Group if you asked Chief Information Security Officers (CISOs) to name their top 3 technology solutions they would implement in a green field situation, firewalls and anti-virus are still in the... Read More


WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

WHITE PAPER: Egnyte

File Sharing Beyond the Firewall
Learn how to provide local file access outside with any computer or mobile device outside the firewall, without the need for VPN. See why cloud-enabled storage is the next generation of file sharing infrastructure Read Now!

The Facebook privacy conundrum: Desire for more confidentiality grows but so does amount of personal data
A look at the history of a select portion of Facebook users from 2005 thorough 2011 finds a contrast in privacy - on one hand the group sought greater privacy controls but actually disclosed more personal data over time. Read More

INSIDER
How to blunt spear phishing attacks
According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. In other words, somebody received an email and either clicked on a link or opened a file that they weren't supposed to. Read More


WHITE PAPER: AccelOps

Operationalizing Information Security ebook
The use of security information and event management (SIEM) as part of an integrated security management program is an information security best practice. Read Now

Java security woes to stay with businesses for a long time
Oracle released an emergency patch to fix two flaws in Java 7 and Java 6 on Monday, but five new vulnerabilities were identified the same day Read More

Cloud forensics: In a lawsuit, can your cloud provider get key evidence you need?
Any business that anticipates using cloud-based services should be asking the question: What can my cloud provider do for me in terms of providing digital forensics data in the event of any legal dispute, civil or criminal case, cyberattack or data breach? Read More


WHITE PAPER: F5

Vital Security Strategies for Microsoft Exchange
The demand for access to email anytime, anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn about vital security requirements every Exchange environment should have in place to improve security and availability for Exchange. Read Now.

Hockey sticks, pocket knives and billiard cues among carry-on items TSA will soon let onboard planes
As of April 25th the Transportation Security Administration will let a bunch of previously prohibited items such as small pocket knives and what it calls "novelty" or toy bats to be taken on aircraft as carry-ons. The idea the agency said was to let Transportation Security Officers better focus their efforts on spot higher threat items such as explosives and guns (see more on that topic below). Read... Read More

Following hack, Evernote speeds move to two-factor authentication
Evernote is speeding up its plans to offer two-factor authentication to users following a recent data breach that exposed user names, email addresses and encrypted passwords. Read More

Spamhaus warns marketers to keep email databases tidy
Spamhaus is warning marketers to keep their databases cleansed of bad email addresses lest their messages be mistaken for spam and blocked. Read More

Ransomware targets Windows PowerShell
Malware uses Microsoft encryption to hold computers hostage Read More

 
 
 

SLIDESHOWS

How different tech degrees measure up

Here's our list of lucrative tech degrees, ranked from lowest to highest starting salary.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Why Moore's Law, not mobility, is killing the PC

2. Best Buy cancels telework program

3. Watch a Chinese military hacker launch a successful attack

9. Strangest Apple store robbery: Thieves attack with bear spray

5. This company ditched its landlines and iPhones in favor of iPad Minis

6. Yahoo CEO Mayer checked VPN logs before banning home networking

7. Tablet wars: Microsoft Surface RT v. Apple iPad

8. Which tech degrees pay the most from day one?

10. Windows 8 apps are missing in action

4. Microsoft may not scan your email for keywords like Google, but your boss can

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: