Search This Blog

Thursday, March 14, 2013

Security of open-source software again being scrutinized

  NASA's Inspector General paints bleak picture for agency projects, IT security | Microsoft patch stops attackers from owning PC via USB flash drive hack
 
  Network World Security

Forward this to a Friend >>>


Security of open-source software again being scrutinized
A recent round of flaws discovered in open-source software has reignited concerns that security is getting bypassed in the rush to continue expanding the large and extremely popular code base used by millions. Read More


WEBCAST: Cisco

Data Center Security Deep Dive with TechWiseTV
Understand the top priorities and key challenges in securing physical, virtual, and cloud architectures. Tune into the TechWiseTV team for an engaging, info-packed deep-dive into the critical topics surrounding data center security. Watch Now

WHITE PAPER: Cisco

Design Guide: Cisco Virtualized Data Center, Version 2.2
Don't miss this in-depth guide. The Cisco VMTD system defines an end-to-end architecture, providing a reference for the migration or build-out of virtualized, highly-secure multi-tenant data centers for new cloud-based service models. Read Now

NASA's Inspector General paints bleak picture for agency projects, IT security
The bottom line for NASA as well as any number of government agencies in this new era of sequestration is money - and NASA in this case has too many programs chasing too few dollars. Read More

Microsoft patch stops attackers from owning PC via USB flash drive hack
Yesterday Microsoft issued seven updates, four of them critical, to address 20 vulnerabilities in Windows, Office, Internet Explorer, SharePoint (Server Tools) and Silverlight. MS13-021 resolves nine issues in Internet Explorer. "The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. Read More


WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

Twitter's 'crippling' API changes kill Twit Cleaner; users in 'grief'
Twit Cleaner, a popular web app used by hundreds of thousands to clear deadwood from their Twitter accounts, is the latest victim of Twitter's controversial API changes, as the site's sole proprietor, Si Dawson tells me: "It's simply technically impossible for me to continue." Read More

Ignore Cloud Security Assessment at Your Own Risk
Companies that deploy software-as-a-service often don't know everything about the security provisions their SaaS providers and partners have in place. Experts say it's because they don't know what to ask, they don't know what to test and they no longer know what's standard for a cloud service provider contract. Read More


WHITE PAPER: Fiberlink Communications

Best Practices Guide: for Mobile Device Management
This guide gives you best practices for Mobile Device Management (MDM) in the Enterprise that you can use now. Learn More

Video: Security Threat Landscape - March 2013
document.write(''); document.write(''); document.write(''); document.write(''); document.write(''); Read More

Users flock to Japan student's firewall-busting thesis project
If you're not sure about the purpose behind Daiyuu Nobori's online thesis project, perhaps the large picture of the collapse of the Berlin Wall will help. Read More

 
 
 

SLIDESHOWS

How different tech degrees measure up

Here's our list of lucrative tech degrees, ranked from lowest to highest starting salary.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Users flock to Japan student's firewall-busting thesis project

2. A visual history of Linux

3. Windows 8: How to solve the Start Button dilemma

9. AT&T smashes distance record for 400Gbps data connection

5. Cisco-funded startup unveils breakthrough router, targets SDNs

6. Cisco joins with Arbor Networks to fight DDoS attacks

7. Surface Pro is making people crazy

8. Cisco adds app performance to branch routers

10. 4 Internet privacy laws you should know about

4. Cost battle: Cloud computing vs. in-house IT

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: