Monday, April 07, 2014

Patch Tuesday: Final Microsoft support for Windows XP addresses Internet Explorer problems

Cisco, VMware take SDN battle to policy arena | New federal rule requires banks to fight DDoS attacks

Network World Security

Forward this to a Friend >>>


Patch Tuesday: Final Microsoft support for Windows XP addresses Internet Explorer problems
Microsoft's final patches for Windows XP that come out next week focus on critical problems with older versions of Internet Explorer that can result in malicious code being run remotely on victim machines. Read More


WHITE PAPER: Kaspersky

Who's Spying on You?
You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. View Now

WHITE PAPER: Sophos, Inc.

Advanced Persistent Threats: Detection and Protection
In this paper we'll explain how a multi-faceted approach to protect against APTs including layers of defense can reduce the risk of attacks. Learn More

Cisco, VMware take SDN battle to policy arena
The focus in SDNs and programmable networking is shifting to application policy, an area where vendors can instill their unique architectures and maintain customer dependency. Read More

New federal rule requires banks to fight DDoS attacks
Banks and financial institutions regulated by the federal government must now monitor for distributed denial-of-service (DDoS) attacks against their networks and have a plan in place to try and mitigate against such attacks, a federal regulatory body said this week. Read More


WHITE PAPER: Kaspersky

Virtualization Security Is Not an Oxymoron
While the business benefits of virtualization are clear--increased performance and stability and decreased hardware costs, floor space, and management oversight--the virtualized world makes your organization vulnerable to a wide array of new cybersecurity threats. View Now

5-year-old hacks Xbox, becomes Microsoft 'security researcher'
A 5-year-old San Diego boy has been commended by Microsoft for his security skills after finding a vulnerability in the company's Xbox games console. Read More

BlackBerry pushes upcoming BBM Protected for end-to-end encrypted messaging
BlackBerry is promoting an upcoming end-to-end encrypted messaging service called BBM Protected for industries that need the highest levels of security. Read More


WHITE PAPER: Sophos, Inc.

Managing BitLocker With SafeGuard Enterprise
This whitepaper explains how Sophos SafeGuard Enterprise secures your data wherever it's stored; and how it allows you to support diverse platforms and encryption products including BitLocker. Learn More

XSS flaw in popular video-sharing site enabled DDoS attack through visitors' browsers
Attackers exploited a vulnerability in a popular video-sharing site to hijack users' browsers for use in a large-scale distributed denial-of-service attack, according to researchers from Web security firm Incapsula. Read More

Co3 Systems automates incident response with best practices
The market is saturated with security technologies designed to prevent bad stuff from happening, and we also have a lot of solutions to detect if something improper is happening or has happened. The next wave of security automation is coming, and that's the area of incident response. Precisely what should you do if a security incident has happened? Read More

Microsoft to start blocking adware that lacks easy uninstall
Microsoft has toughened its criteria for classifying programs as adware and gave developers three months to conform with the new principles or risk having their programs blocked by the company's security products. Read More

Businesses face rising political pressure from data breaches
The data breaches like the one at Target and more recently a unit of credit bureau Experian are fueling consumer protection efforts that could have an impact on business. Read More


SLIDESHOWS

Hot products at Interop

These products are on display at the annual tech conference in Vegas.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Linus Torvalds suspends key Linux developer

2. FireEye, AhnLab score low in lab test of breach detection systems

3. Cisco reveals OpenFlow SDN killer

4. VMware: How the hypervisor can be security's savior

5. Hot products at Interop

6. How Boeing is using the cloud

7. Microsoft's mobile moves: Still your father's technology company

8. Cisco looks at extending OpFlex

9. Top 10 geek travel gadgets you need

10. Juniper slashing 500-plus jobs, closing facilities


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment