Search This Blog

Thursday, April 17, 2014

Microsoft releases new-and-improved Threat Modeling Tool 2014

Can Heartbleed be used in DDoS attacks? | The IRS uses computers?! The horror!

Network World Security

Forward this to a Friend >>>


Microsoft releases new-and-improved Threat Modeling Tool 2014
Threat modeling can help identify "design-level security and privacy weaknesses in systems," wrote Trustworthy Computing's Tim Raines. "Threat modeling is also used to help identify mitigations that can reduce the overall risk to a system and the data it processes. Once customers try threat modeling, they typically find it to be a useful addition to their approach to risk management." Read More


RESOURCE COMPLIMENTS OF: Dell

Achieve Deeper Network Security and Control
Next-generation firewalls (NGFWs) revolutionized network security. Traditional firewalls that only focus on stateful packet inspection and access control rules are ineffective in today's advanced-threat environment. To protect your organization from threats, your NGFW must be able to deliver a deeper level of network security. Learn why Dell™ SonicWALL™ NGFWs are the only firewalls capable of providing organizations of any size with the proper level of network security.

WHITE PAPER: Dell Software

Protect your organization while supporting mobility and BYOD
Check out this new white paper to learn how Dell Mobility Solutions for security can help protect your organization's information, systems and networks while simplifying administration and supporting employees with forward-thinking mobility initiatives for a range of devices and operating systems. Learn more

Can Heartbleed be used in DDoS attacks?
With nearly every major threat to information security, it is not long before security experts ask the question, "Can the threat play a role in distributed denial of service (DDoS) attacks?" When it comes to Heartbleed, some people are screaming that the sky is falling, but it is more complicated than that. Read More

The IRS uses computers?! The horror!
It's impossible to imagine the Internal Revenue Service or most other number-crunching agencies or companies working without computers. But when the IRS went to computers -- the Automatic Data Processing system --there was an uproar. The agency went so far as to produce a short film on the topic called Right On The Button, to convince the public computers were a good thing. Read More

Scam by Victoria's Secret clerk highlights common risk
Headlines and the attention of IT professionals have been dominated by Heartbleed recently, yet it's a news story out of Florida that reminds us of an all-too-common identity-theft threat that most of us face on a routine basis: credit-card skimmers. Read More


WHITE PAPER: AlienVault

The SIEM Evaluator's Guide
When evaluating any technology, it's essential to outline your primary use cases and success factors. This guide provides essential SIEM evaluation criteria, "Pro Tips" and use cases, plus an overview of how AlienVault Unified Security Management (USM) meets each requirement. Learn more >>

Organizations suffer SQL Injection attacks, but do little to prevent them
On Wednesday, the Ponemon Institute released the results of a new study conducted for DB Networks. In it, 65 percent of the respondents said that they've experienced one or more SQL Injection attacks in the last 12 months. In addition, each incident took an average of 140 days to discover, and 68 days to fix the issue. Read More

Kill switches coming to iPhone, Android, Windows devices in 2015
Wireless carriers in the U.S., handset makers and the industry's lobbying group have made a significant concession on technology that could remotely disable stolen smartphones and tablets. Read More

9 Things You Need to Know Before You Store Data in the Cloud
The amount of electronic information (e.g., documents, images, emails, videos) organizations produce is staggering. Storing all your digital data in your data center can be expensive. That's why cloud storage -- which often comes at a fraction of the cost of storing the information on-premises -- has become increasingly popular. Read More


WHITE PAPER: Sophos, Inc.

Endpoint Buyer's Guide
Evaluating the many components that make up an endpoint security solution may seem overwhelming. Get independent research and test results to help you determine your requirements and identify the vendor that best meets your needs. Learn More

Rushed Heartbleed fixes may expose users to new attacks
In the race to protect themselves from the Heartbleed vulnerability, enterprises could be opening themselves up to new attacks if they aren't careful. Read More

Fortinet, McAfee, Trend Micro, Bitdefender battle in socially-engineered malware prevention test
Socially-engineered malware tries to trick users into downloading and executing malicious code through tactics that include everything from fake antivirus to fake utilities to fake upgrades to the operating system and trojanized applications. NSS Labs tested several endpoint security products to see how well each would block these attacks. Read More

Inside evolving satellite technology
Take a look inside Russian NASA, ESA spacecraft construction Read More


SLIDESHOWS

10 Big Data startups to watch

These 10 startups to watch were chosen based on third-party validation, experience, and market potential.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Heartbleed bug is irritating McAfee, Symantec, Kaspersky Lab

2. 10 cool tech things you could buy instead of Google Glass

3. Best browsers for safe surfing

4. 6 Social Media Mistakes That Will Kill Your Career

5. 10 Big Data startups to watch

6. 50 years of BASIC: Celebrating the programming language's long, eventful life

7. Heartbleed Bug hits at heart of many Cisco, Juniper products

8. VMware promises Heartbleed patches for affected products by the weekend

9. Google details its ambitious Project Ara modular smartphone

10. Top techie college commencement speakers: 2014


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: