Search This Blog

Tuesday, May 07, 2013

Microsoft confirms zero-day vulnerability exploiting IE8

  Security tools can't keep hackers at bay | Enterprise vendors: There's no such thing as product secrecy any more
 
  Network World Security

Forward this to a Friend >>>


Microsoft confirms zero-day vulnerability exploiting IE8
After reports of a zero-day vulnerability exploiting IE8 for watering hole attacks, Microsoft confirmed the flaw and released Security Advisory 2847140. Microsoft Security Response Center wrote, "Internet Explorer 6, 7, 9 and 10 are not affected by the vulnerability. Read More


WHITE PAPER: Aerohive

Wireless LAN: Preferred Enabler of BYOD
Bring Your Own Device (BYOD) and its array of wireless devices is becoming the dominant way workers access corporate networks . And it's forced IT leaders need to reexamine how to best provide secure, reliable and cost-effective wireless network access. Read Now

WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

INSIDER
Security tools can't keep hackers at bay
Credit card data of customers of Schnucks supermarkets was exposed for months in a breach that was not closed until weeks after a card processing company issued an alert about fraudulent activity. Insider (registration required) Read More

Enterprise vendors: There's no such thing as product secrecy any more
Some enterprise vendors try to keep what they are offering away from what they think might be the wrong eyes. This is never a good idea. Read More


WHITE PAPER: F5

Top Considerations When Choosing an ADC
Because of its strategic location in the data center network, the selection of an Application Delivery Controller requires careful consideration of both functional and financial factors. This paper explores important elements to evaluate, including network performance, availability and security. Learn More.

McAfee's Stonesoft Acquisition: A Strategic Enterprise Move With Short- and Long-term Benefits
I received an email early this morning announcing that McAfee acquired European Next-generation firewall (NGFW) vendor Stonesoft for $389 million. I'm sure the trade press and young/rich Wall Street analysts are running around asking the obvious question: Who the heck is Stonesoft and why did McAfee cough up so much dough for a virtually unknown company? Allow me to respond to these inquiries... Read More

Security Manager's Journal: Plans and processes are made to be revised
The company's incident-response plan needs to be updated. That's normal -- no plan is carved in stone. Read More


WHITE PAPER: Tripwire

10 Steps to Risk-based Security Management
Many professionals in information security espouse the belief—and commitment to—"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Learn More

Former FBI agent: All phone calls recorded, no digital communication secure
Last week, the press focused on Katherine Russell, the widow of Boston bombing suspect Tamarlan Tsarnaev, as officials have been trying to determine what she knew about the bombing. Read More

Florida restricts use of drones by law enforcement officials
A new Florida law restricts the use of unmanned aerial vehicles, or drones, by state law enforcement officials. It's the first law of its kind in the country. Read More

Women leaders in security recognized
Each year, the Executive Women's Forum announces their "Women of Influence" Awards at their annual EWF event. Read More

 
 
 

SLIDESHOWS

CEO pay

Median pay for tech CEOs in 2012 was $10.7 million, according to Network World's analysis of CEO compensation in the tech industry.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. How Facebook aims to reinvent hardware

2. Veteran tech workers see themselves locked out of job market

3. Hope you like Jelly Bean, because you're not getting Key Lime Pie

10. iPhone 6 rumor rollup for the week ending May 3

9. The cloud's the limit for new Arista, Brocade and HP switches

6. Skype accounts easily hijacked via Skype Support, warns hacker

5. Systems manager arrested for hacking former employer's network

4. Windows 8 update: 2nd generation Surface tablets may debut next month

7. Juniper closer to Cisco in shipping SDN brains

8. Experts hope for another failure in next Anonymous attack

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: