Search This Blog

Friday, October 25, 2013

Cisco fixes serious security flaws in networking, communications products

Oversharing information can lead to disaster online | It's criminal: Why data sharing lags among law enforcement agencies

Network World Security

Forward this to a Friend >>>


Cisco fixes serious security flaws in networking, communications products
Cisco Systems released software security updates Wednesday to address denial-of-service and arbitrary command execution vulnerabilities in several products, including a known flaw in the Apache Struts development framework used by some of them. Read More


RESOURCE COMPLIMENTS OF: IT Roadmap 2013

NEW: IT Roadmap Washington, D.C. is all new for 2013!
The content-rich agenda has been redesigned and reenergized to include increased IDG content from editors you know and trust and FIVE FOCUSED PILLARS OF TECHNOLOGY learning that are the most critical for the year ahead. Register now. Attend on December 12th. It's free!

WHITE PAPER: Trusteer

Stepping Up the Battle Against Advanced Threats
The primary approaches used to fight advanced threats over the past several years simply aren't effective. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Learn More

Oversharing information can lead to disaster online
Criminals use a variety of tools and tactics when selecting victims and conducting attacks. But information is the key to any malicious campaign, and the more personal it is, the more value it holds. When one goes about their daily life online, how much information is too much, and what should be protected? Read More

It's criminal: Why data sharing lags among law enforcement agencies
In 2008 the FBI's Criminal Justice Information Services division (CJIS) embarked on an ambitious effort to enable information sharing among every federal, state, tribal and local law enforcement agency in the United States. It launched the National Data Exchange (N-DEx), an $85 million data warehouse project, and waited for the data to roll in. Kevin Reid, the program manager at that time, expected the majority of agencies to be voluntarily participating by 2009 -- two years ahead of plan. Read More


WEBCAST: ForeScout Technologies

Continuous Monitoring & Mitigation: the New InfoSec Frontier
Given network, device, access and threat dynamics, how can IT be more efficient and effective to identify and resolve exposures and attacks? This live broadcast brings together a panel of industry experts to discuss the advantages of leveraging controls and intelligence through a bi-directional integration. View now >>

Rise of humanoid robots
From the new Bionic Man to robotic bartenders, machines are looking and acting more human that ever. Read More

INSIDER
Computer Criminals Continue to Vex IT Groups
As security breaches rise, CIOs and CISOs aren't as good as they think they are at protecting corporate assets. Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

NIST's latest cybersecurity framework reveals a lot of goodwill amidst continued criticism
After delays due to the government shutdown, the National Institute of Standards and Technology (NIST) released on October 22 its latest version of a comprehensive cybersecurity framework for critical infrastructure as mandated by President Obama's February cybersecurity executive order (EO). This preliminary framework is subject to a 45-day public comment period, after which NIST will make revisions and then produce a final framework for publication in February. Read More

Malcovery Security offers unique services to put a stop on phishing attacks
Startup Malcovery Security has a unique way of looking at phishing attacks. Through deep analysis of phishing spam, Malcovery can often identify the precise person behind waves of attacks. The idea is to take that person out of commission – preferably to put them behind bars – in order to eliminate the source rather than just the symptoms of phishing. Read More

Security tool delivers surprise insights to Domino's Pizza
Marketers at Domino's Pizza are gaining new and more immediate insights into online coupon usage from an unexpected source: a security management tool used by the national chain's IT department. Read More


SLIDESHOWS

8 most interesting tech gadgets of 2013

Everybody knows Microsoft Word now, but what do you know about where it came from?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Researchers tout electricity storage technology that could recharge devices in minutes

2. Knight Capital fined a measly $12M for a software bug that cost $460M

3. How the cloud is blowing up the network

4. Apple's free OS is no threat to Linux at all, Torvalds says

5. 10 most powerful network management companies

6. Review: Ubuntu Touch on a Nexus 7 is almost awesome

7. Firefox community roiled by Java crackdown

8. 10 things that scare the bejeezus out of IT pros

9. Microsoft's IT graveyard: 16 products that Microsoft killed

10. Microsoft Word: At 30, the word processing package is king, but threats abound


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment:

Anonymous said...

Thank you for bringing more information to this topic for me. I’m truly grateful and really impressed. Please visit http://goo.gl/F0pBiQ