Search This Blog

Thursday, October 24, 2013

Microsoft and Symantec push to combat key, code-signed malware

4 ways metrics can improve security awareness programs | US court rules warrant required for GPS tracking of vehicles

Network World Security

Forward this to a Friend >>>


Microsoft and Symantec push to combat key, code-signed malware
An alarming growth in malware signed with fraudulently obtained keys and code-signing certificates in order to trick users to download harmful code is prompting Microsoft and Symantec to push for tighter controls in the way the world's certificate authorities issue these keys used in code-signing. Read More


WEBCAST: ForeScout Technologies

Continuous Monitoring & Mitigation: the New InfoSec Frontier
Given network, device, access and threat dynamics, how can IT be more efficient and effective to identify and resolve exposures and attacks? This live broadcast brings together a panel of industry experts to discuss the advantages of leveraging controls and intelligence through a bi-directional integration. View now >>

WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

4 ways metrics can improve security awareness programs
Useful and legitimate metrics have long evaded the information security community as a whole. Without proper metrics, you cannot truly prove the value of a security program. This makes it difficult to justify increasing the budget and even maintaining the budget that you have. Read More

US court rules warrant required for GPS tracking of vehicles
A U.S. appeals court has ruled that police must obtain a warrant prior to using a GPS device to track a vehicle, deciding on an unaddressed issue in an earlier Supreme Court order. Read More

16 Traits of Great IT Leaders
Being an exceptional leader is about more than getting the job done. You've got to balance your team's need with your goals and objectives as well as your emotions. You've got to think about things from other people's perspective and sometimes do things that, while are in the best interest of the team, might not be great for you. While there a number of different leadership styles, the best leaders share some common traits. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Eavesdropping made easy: Remote spying with WeMo Baby and an iPhone
When it comes to home automation, many people turn to Belkin WeMo because you can plug almost anything into the "smart" electrical switch and then remotely control it from a smartphone. Read More

Despite drop in fraud, businesses told to remain vigilant
Lower fraud rates are giving many companies a false sense of security and U.S. organizations are particularly good at ignoring trends that point to the need for vigilance, a global study found. Read More

Security Professionals Want More Government Cybersecurity Action
Now that the federal government is working again, I was wondering: What ever happened to cybersecurity legislation? As far as I can tell the Cybersecurity Act of 2013 (S.1353) and CISPA are dead-in-the-water right now. Why? Edward Snowden and NSA programs put the kybosh on public trust (especially International trust) and Congress has other things it would rather fight about. Read More


WEBCAST: IBM

Fighting Fraud Videos: IBM Intelligent Investigation Manager
Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both the commercial and public sector space. Learn More.

Obamacare exchange contractors had past security lapses
Two of the contractors involved in developing the Affordable Care Act healthcare exchanges have had fairly serious data security issues, a Computerworld review of publicly available information has found. Read More

Even the tech-savvy are prone to compromise
The millennial generation, those of us who were born and raised alongside the Internet, should be wise enough to avoid account hijackings and other scams, but we're not. In fact, one out of four millennials have admitted to having at least once incident where an online account was hacked. Read More

Network Solutions reports more DNS problems
Network Solutions said Tuesday it was trying to restore services after another DNS (Domain Name System) problem. Read More


SLIDESHOWS

8 most interesting tech gadgets of 2013

Everybody knows Microsoft Word now, but what do you know about where it came from?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Review: Ubuntu Touch on a Nexus 7 is almost awesome

2. Firefox community roiled by Java crackdown

3. Say hello to the text-friendly office chair

4. First look: Apple iPad Air & more

5. 10 most powerful network management companies

6. Juniper targets key new switch directly at Cisco Nexus 6000

7. Apple quietly releases iOS 7.0.3, with new fixes and features

8. Apple cuts prices on Macs, takes a jab at PCs

9. Q&A: Clement Lefebvre; The man behind Linux Mint

10. Calling all security gods - DARPA has $2 million cyberthreat challenge for you


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: