Search This Blog

Friday, March 07, 2014

Major security flaw threatens Linux users

12 terrific techie TED talks | Why you need to segment your network for security

Network World Compliance

Forward this to a Friend >>>


Major security flaw threatens Linux users
A source code mistake in the GnuTLS library – an open-source software building block used in a large number of different Linux distributions to handle secure Internet connections – could prove a serious threat to the privacy of Linux users, as developers rush to patch the vulnerability. Read More


WHITE PAPER: Symantec

Security Requirements for Electronic Health Records
Download this whitepaper to learn about the challenges surrounding the new world of EHR technology, including the requirements that govern protecting confidential patient data online. The report also details the measures that organizations need to start taking now to prepare for the upcoming changes in the healthcare industry. Learn More>>

WHITE PAPER: VCE

Power Plant Achieves Required High-Availability with VCE
Faced with an external compliance audit and the need to improve availability, one of Europe's largest power plants turned to VCE Vblock™ Systems to: - Transform twin data centers to active-active mode - Enable business continuity and reliable delivery of electricity - Virtualize 95% of applications Learn More

12 terrific techie TED talks
The true meaning behind 404 pages, an optimistic George Orwell & more Read More

Why you need to segment your network for security
Pen tester Mark Wolfgang argues segmenting for security is a key piece of an overall defense-in-depth strategy. Here he explains why and how to accomplish it in your organization (registration required) Read More

Report: Half of all exploits target Java
Once upon a time, Microsoft was the favorite target of malware developers. As Microsoft improved the defenses in its software, though, cybercrooks moved on to easier pickings. Adobe was a prime target for a while, but Adobe followed Microsoft's lead and made its software more secure as well. According to data from the 2014 IBM X-Force Threat Intelligence Quarterly Report, the favorite target is now Java. Read More

9 must-do's if you must stick with Windows XP
Without updates after April 8 Windows XP is expected to fall prey to any number of zero-day attacks for which Microsoft will provide no defense, but there are some things die-hard XP users can do to make their machines safer. Read More


WHITE PAPER: Kaspersky

Security for Virtualization
The view of leading analysts is that in the rush to implement virtualization, security has become a poor second. So while the business benefits are clear, the risks are less well documented and understood. This makes selecting the right virtual-aware anti-malware solution even more important. Learn More

Network firewalls aren't dead yet
Phil Cummings says network firewalls will continue to be a critical piece of Health Information Technology Services -- Nova Scotia security portfolio for one simple reason: nothing's come along to replace them. Read More

30 richest techies in the world
Forbes came out with its list of billionaires and techies make an impressive showing on the list. Read More

CyberLocker's success will fuel future copycats
Nothing spurs malware development like success and that's likely to be the case in the coming months with ransomware. Read More

Target CIO Resignation Puts Retail CIOs on Alert
As Beth Jacob's resignation from Target shows, retail CIOs are culpable for security breaches even though they might not have the resources in-house to protect the company. Read More


WEBCAST: Attachmate

Unlocking and Service-Enabling Legacy Assets
Whether your strategy calls for full-blown SOA, quick-turnaround mobile applications, or anything in between, Verastream Host Integrator can help. Watch this six-minute product demo and learn the noninvasive way to encapsulate mainframe data and logic as reusable services. View Now!

The risk of offshoring security
Over the past twenty years or more, corporations in nearly all industries have been outsourcing and offshoring at hyperdrive. Read More

Cisco: $300,000 prize for Internet of Things security apps
Cisco today kicked off a contest with $300,000 in prize money that challenges security experts around the world to put together ways to secure what's now called the "Internet of Things," the wide range of non-traditional computing devices used on the electric grid, in healthcare and many other industries. Read More

Six things companies do that thwart their IT security efforts
Even as organizations strive to build and maintain a strong enterprise security program, there are a couple things companies do that actually thwart their efforts for strong security. Read More

15 things we hate about Java
Slow startup times, null pointers, security flaws -- Java's ongoing success leaves plenty to complain about Read More


SLIDESHOWS

The 700MHZ spectrum: Who owns what?

700MHZ spectrum holdings, from T-Mobile to Verizon and AT&T to Echostar.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 9 must-do's if you must stick with Windows XP

2. 30 richest techies in the world

3. Inside Cisco's private cloud

4. Cisco revamps enterprise product pricing

5. Network firewalls aren't dead yet

6. Major security flaw threatens Linux users

7. Cisco execs address defective memory component issues with routers, switches

8. SDNs move from theory to reality

9. FIRST LOOK: Cisco Nexus 9000

10. Revisiting Cisco's newest data center


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: