Search This Blog

Wednesday, April 23, 2014

Risk and the Android Heartbleed vulnerability

Most but not all sites have fixed Heartbleed flaw | US developing public unmanned aircraft incident reporting system

Network World Security

Forward this to a Friend >>>


Risk and the Android Heartbleed vulnerability
I haven't written about the Heartbleed vulnerability. Anything I had to say would have just added to the atmosphere of fear, uncertainty, and doubt, or might have caused a 15-year-old who has been coding since he was five to track me down through stackoverflow to reprimand me for some inexcusable oversight. Don't laugh, it happens. But now that the dust has settled, here are a few thoughts about... Read More


RESOURCE COMPLIMENTS OF: SAP

The Keys To Boosting PSO Success
Professional services organizations (PSOs) strive to help their clients' businesses run more smoothly. But what are they doing to make their own businesses run more efficiently? One method for success with proven results: deploying technology, from vendors such as SAP, that delivers both internal efficiency and external results. Learn how to deliver a higher percentage of on-time, on-budget project completions, boost revenue and customer retention, and ultimately improve profit margins.

WHITE PAPER: Dell Software

Protect your organization while supporting mobility and BYOD
Check out this new white paper to learn how Dell Mobility Solutions for security can help protect your organization's information, systems and networks while simplifying administration and supporting employees with forward-thinking mobility initiatives for a range of devices and operating systems. Learn more

Most but not all sites have fixed Heartbleed flaw
The world's top 1,000 websites have been patched to protect their servers against the "Heartbleed" exploit, but up to 2% of the top million were still vulnerable as of last week. Read More

US developing public unmanned aircraft incident reporting system
It sounds like a good idea - develop an online system of publically reporting and disseminating problems or incidents stemming from the use of unmanned aircraft in the public airspace. In practice you'd have to wonder if such a system would get used much because it seems like the system has just a few caveats. Read More


WHITE PAPER: OPSWAT

Advanced threat detection methods for securing remote users
Remote users can introduce significant threats to your network. As employees and other business partners increasingly work from the road and remote offices, the risks have grown exponentially. To secure remote users, unique advanced threat detection solutions are needed. Learn more

Reddit penalizes technology subreddit for censoring headlines about 'spying', 'NSA'
I don't visit Reddit every day, but when I do, I check out /r/technology. Over the weekend, I wondered why "technology" was no longer listed across the top of Reddit. Read More

Security Manager's Journal: Virtual machines, real mess
It started out as a simple call to the help desk from an engineer at one of our major development centers: Phone calls were being dropped. Soon, similar complaints were coming in from other engineers, as well as from sales associates, who said the inability to maintain phone calls was making it difficult to close deals. Read More


WHITE PAPER: Alert Logic and PEER 1 Hosting

Defense Throughout the Vulnerability Life Cycle
This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle. Learn More

3 privacy violations you shouldn't worry about
In the past few years, the public has been confronted with hitherto unimaginable levels of personal privacy invasions. Read More

Even the most secure cloud storage may not be so secure, study finds
Some cloud storage providers who hope to be on the leading edge of cloud security adopt a "zero-knowledge" policy in which vendors say it is impossible for customer data to be snooped on. But a recent study by computer scientists at Johns Hopkins University is questioning just how secure those zero knowledge tactics are. Read More

SEC seeks data on cyber security policies at Wall Street firms
The Securities and Exchange Commission plans to review the cyber defenses of 50 Wall Street broker-dealers and investment advisers to determine whether they are prepared for potential cyber threats. Read More

Major security flaws threaten satellite communications
An analysis of satellite communication gear from more than a half-dozen major manufacturers has uncovered critical vulnerabilities that could be exploited to disrupt military operations and ship and aircraft communications. Read More


SLIDESHOWS

10 Big Data startups to watch

These 10 startups to watch were chosen based on third-party validation, experience, and market potential.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Whatever happened to the IPv4 address crisis?

2. California bill proposes mandatory kill-switch on phones and tablets in 2015

3. ATM malware, controlled by a text message, spews cash

4. 16 weirdest places you'll find Linux

5. 28 facts about pi that you probably didn't know

6. 12 free cloud storage options

7. Top 20 colleges for computer science majors, based on earning potential

8. 8 free Wi-Fi stumbling and surveying tools

9. IRS misses XP deadline, pays Microsoft millions for patches

10. How to change Windows 8.1 to local account with no Microsoft email account required


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: