Search This Blog

Monday, December 09, 2013

From Windows from Vista to 8.1, Microsoft Year-end Patch Tuesday hits 'em all

Cloud Security Alliance offers ultra-high cloud security plan | National Science Foundation IT guy gets smacked for stealing $94,493 worth of electronic goodies

Network World Security

Forward this to a Friend >>>


From Windows from Vista to 8.1, Microsoft Year-end Patch Tuesday hits 'em all
Microsoft is wrapping up the year's Patch Tuesday bulletins next week with 11 more fixes, pushing the total for 2013 to 106, up from last year's total of 83. Read More


WHITE PAPER: Dell

Four Steps toward Planning a Successful Email Migration
Email migrations isn't as simple as purchasing new hardware and moving user accounts. Strong planning and good tools are also essential. In this tech brief, learn how you can execute four key steps in your email migration, and the tools that make it easy and secure. Read now!

WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Cloud Security Alliance offers ultra-high cloud security plan
The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies. Read More

National Science Foundation IT guy gets smacked for stealing $94,493 worth of electronic goodies
This IT guy had an all-together different idea of how to spend government money. The Department of Justice today said James Troy Clark, 51, of Fredericksburg, Va., an IT specialist with the National Science Foundation plead guilty this week to theft of government property totaling more than $90,000. [IN THE NEWS: Bitcoin's highest highs, lowest lows] Read More

Using BYOD? Get SaaS-based mobile device security
CISOs' number one concern about allowing BYOD is the security of enterprise data. A close second is the security of the enterprise network that can be compromised by just one malware-infected smart device. Mojave Networks addresses those concerns by offering enterprise-grade security for mobile devices from the cloud. Read More


WEBCAST: Egnyte

Consider Hybrid Approach to File-Sharing
Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with short videos, white papers and demos. View Now!

Foundation exec slams Microsoft for 'meaningless' security pledge
The Free Software Foundation on Thursday attacked Microsoft for "meaningless" public statements on privacy and security, claiming that Windows is "fundamentally insecure." Read More

Study finds zero-day vulnerabilities abound in popular software
Subscribers to organizations that sell exploits for vulnerabilities not yet known to software developers gain daily access to scores of flaws in the world's most popular technology, a study shows. Read More

Get a Password Manager Now
Well maybe it is just the time of year, or maybe it's the time of man (extra points if you know what song that is from), but password thefts are popping up all over. First the Read More


WHITE PAPER: Stratacache

Maximizing the Online Experience with Cache Technology
In this enlightening interview, we explore how retail cache technology reduces latency and diminishes bandwidth requirements for an optimal user experience. Learn More.

Navy blasts drone from submerged sub
The U.S. Naval Research Laboratory said it has successfully launched an unmanned electric fuel cell aircraft from a submerged submarine. Read More

Data breaches have eroded consumer faith in security, Fujitsu finds
A decade of data breaches has left barely one in ten UK consumers with faith in the ability of large organisations to safeguard their personal data, a survey for Fujitsu has revealed. Read More

Microsoft says government snooping constitutes an APT event
Microsoft isn't happy, and their top lawyer had plenty to say about protecting customer information this week in a blog post that announced the company's efforts to implement wide-reaching encryption. Read More

IBM blames ISPs for 'offensive' Internet ... back in 1994
1994: It was a simpler time, when IBM sold an operating system called OS/2 version 3.0 (a.k.a. OS/2 Warp) and corporate lawyers could plausibly imagine people venturing onto the Internet and being shocked - shocked! - to find "objectionable" content there. Read More

New website lets users check if their online credentials were exposed in large data leaks
A new website allows Internet users to check if their usernames and passwords were exposed in some of the largest data breaches in recent years. Read More


SLIDESHOWS

Don't click on these links

Whether you receive a phishing email inviting you to click on a specific link or whether you stumble upon it while Web surfing, here are 10 types of links you should never click on.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Microsoft ends Windows 7 retail sales

2. 8 Ethernet predictions for 2014

3. 20 best iPhone/iPad games of 2013

4. The 21 most powerful enterprise networking companies

5. A few finally find HotSpot 2.0 Wi-Fi connections

6. Cisco sees SDN, Internet of Things in its 2014 crystal ball

7. Windows 8 Update: China prefers to stick with dying Windows XP rather than upgrade

8. IT security pros often seen as 'innovation killers,' says ADP's IT security chief

9. Nexus 5 is designed to work on Verizon Wireless, and most other networks

10. Google Compute Engine vs. Amazon Web Services cloud: The battle is on


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: