Search This Blog

Thursday, December 05, 2013

Microsoft: 'We don't provide governments with direct, unfettered access to your data'

6 agencies under DHS rule still using Windows XP: IG finds DHS cybersecurity holes | APT: The security attack everyone loves to hate

Network World Security

Forward this to a Friend >>>


Microsoft: 'We don't provide governments with direct, unfettered access to your data'
Microsoft today pushed back once again against the idea that it's giving the National Security Agency (NSA) carte blanche access to its cloud-based services, an allegation that's cropped up in media reports since the revelations from former NSA contractor Edward Snowden began last June. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

WEBCAST: Silver Peak Systems, Inc.

Combat Disasters And Optimize Business Operations
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication strategies and technologies. View now >>

6 agencies under DHS rule still using Windows XP: IG finds DHS cybersecurity holes
The Department of Homeland Security, which is ultimately the agency responsible for battening down the hatches on U.S. cybersecurity and critical infrastructure, cannot batten down its own cybersecurity hatches, as was illustrated by six of 22 agencies under the DHS umbrella that are still using Windows XP. Read More

APT: The security attack everyone loves to hate
Ever since the term advanced persistent threat (APT) burst on the public scene with Operation Aurora carried out against Google and other hi tech companies, allegedly by the Chinese, the security industry and media have flocked around this new type of attack. Read More

Shadow IT is undermining your security
Once upon a time, not so long ago, the IT admin chose exactly what hardware and software would be used by employees. Recent trends like the consumerization of IT and BYOD (bring your own device) have shifted the balance of power, but IT still has to maintain some degree of control over the applications used and where sensitive data is stored. Many users just download apps or start using unsanctioned services, though, and introduce unnceccesary security risks through "shadow IT." Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Ruby on Rails security updates patch XSS, DoS vulnerabilities
Ruby on Rails users are advised to upgrade to newly released versions of the Web development framework that contain important security fixes, according to the Rails development team. Read More

SANS Technology Institute accredited for masters in security
The cybersecurity-focused SANS Technology Institute has received accreditation that will make it much easier for many students to receive tuition reimbursement from employers. Read More

The 21 most powerful enterprise networking companies
The biggest players on the network, presented for your consideration. Read More


WEBCAST: IBM Corporation

Make your business smarter with cloud-based analytics
Learn how sales, finance, investment, risk, marketing, and procurement leaders are using SaaS-based business analytics to become more agile, serve the customer better, and deliver business results. Learn More.

Kaspersky, six others top malware removal tests
Analyst firm A-V Comparative has released its November 2013 list of the antimalware programs that do the best job of removing malware from an already infected system. Read More

Hackers meet professor's challenge to pen test his online world
Everybody knows, or ought to know, about the risks of being hacked. But it's easy to slip into a level of denial about an amorphous threat and get careless if you don't think anybody is out specifically to get you. Read More

Xbox One's potty-mouth crackdown suggests Microsoft snooping
Despite promises from Microsoft that it would not eavesdrop on customers with the Kinect or Skype, gamers online are saying they have been banned from Xbox Live for using foul language, and not against other people, either. They were just cursing in frustration over something. Read More

Amazon's nightmare: Hijacking drones mid-air with zombie software
Although Amazon's proposed drone-based product delivery service is still apparently years away, one hacker already has a process by which he could hijack and control drones mid-air. Read More


SLIDESHOWS

Don't click on these links

Whether you receive a phishing email inviting you to click on a specific link or whether you stumble upon it while Web surfing, here are 10 types of links you should never click on.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 18 Hot IT Certifications for 2014

2. IT pros share blame for 'shadow IT' problem, survey shows

3. First look: Google Compute Engine vs. Amazon Web Services

4. Targeted attacks spotted in the wild exploiting Windows XP zero-day

5. Gaming company caught building Bitcoin mining botnet from users' computers gets off light

6. Windows 8 Update: China prefers to stick with dying Windows XP rather than upgrade

7. Cisco has this SDN thing covered

8. Don't click on these links

9. How to shove 50 meters of optical fiber into a microchip

10. Google Cloud Compute goes live


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: