Search This Blog

Thursday, May 09, 2013

Mobile Computing Security Mayhem Continues

  Proposed U.S. law aims to counter cybertheft with import bans | Interop network squares off against controlled 70G bit/sec DDoS attack
 
  Network World Security

Forward this to a Friend >>>


Mobile Computing Security Mayhem Continues
I spent the week in Washington DC last week discussing cybersecurity legislation and Federal IT security issues. As part of the tour, I gave a presentation on mobile computing security at the historical Willard hotel. Before discussing MDM, MAM, mobile data security, or anti-malware, I started my session with a few data points from various ESG research projects: Read More


WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

WHITE PAPER: F5

Top Considerations When Choosing an ADC
Because of its strategic location in the data center network, the selection of an Application Delivery Controller requires careful consideration of both functional and financial factors. This paper explores important elements to evaluate, including network performance, availability and security. Learn More.

Proposed U.S. law aims to counter cybertheft with import bans
A bill proposed in the U.S. Senate aims to block imports of products containing U.S. technology stolen online, a move that appears primarily directed at China. Read More

Interop network squares off against controlled 70G bit/sec DDoS attack
The network at one of the biggest annual networking shows is being subject to a series of distributed denial of service attacks (DDoS) creating the equivalent of 90 million sessions attempting to use the network at the same time, all as part of a controlled test of the Interop network. Read More

DARPA moves to create high-power but very cool (literally) cathode technology
Traditional high-powered cathode electron emitter-based equipment for high-bandwidth communications, security screening or imaging applications can run hot, significantly shortening the lifespan and usefulness of the equipment. Read More


WHITE PAPER: Tripwire

10 Steps to Risk-based Security Management
Many professionals in information security espouse the belief—and commitment to—"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Learn More

Highly critical vulnerability fixed in Nginx Web server software
The development team behind the popular Nginx open-source Web server software released security updates on Tuesday to address a highly critical vulnerability that could be exploited by remote attackers to execute arbitrary code on susceptible servers. Read More

What now for lithium ion technology?
A quick look at lithium ion technology and research Read More

Experts wary of Pentagon cybersecurity report fingering China
A recent Pentagon report blaming the Chinese military for cyberattacks on U.S. government computers and defense contractors marks an escalation in rhetoric, but offers no surprises, experts say. Read More


WHITE PAPER: HP, Microsoft & Intel

HP reference configuration for Premium OLTP
This paper describes a hardware and software reference architecture for using HP hardware to deploy very large and highly transactional Microsoft® SQL Server 2008 R2 OLTP database systems in tier 1 enterprise application environments. Learn More!

Stealthy Web server malware spreads further
A stealthy malicious software program is taking hold in some of the most popular Web servers, and researchers still don't know why. Read More

Senators want sanctions against countries supporting cyberattacks
Two U.S. senators will push Congress or President Barack Obama's administration to pursue trade and immigration sanctions against China and other countries that allegedly support cyberattacks on U.S. government agencies and businesses, the lawmakers said Wednesday. Read More

Use of 'honeywords' can expose password crackers
With more and more consumers having their passwords compromised on a daily basis, a pair of researchers are floating an idea that they contend will help foil digital credential crackers. Read More

Passwords: You're doing it wrong. Here's how to make them uncrackable.
For years now I've harangued relatives about their shoddy password practices. Either they use easily hacked passwords or forget the passwords they've created--sometimes both. Read More

 
 
 

SLIDESHOWS

Hottest products from Interop 2013

Interop 2013, one of the biggest networking shows each year, is here and the product announcements are plentiful.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. When tech titans fall from grace

2. Last place you want to see a Windows error message: Las Vegas hotel elevator, 20th floor

3. Florida's identity-theft rate towers lower 49

10. Cisco details ruggedized switches for harsh environments

9. An H-1B jobs database the tech industry may hate

6. Steve Jobs ordered Apple ads off Fox News

5. Hottest products from Interop 2013

4. Time-saving PC tips and tricks

7. Stealthy Web server malware spreads further

8. Google's patent for email snooping?

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: