Search This Blog

Tuesday, May 13, 2014

Windows XP die-hards can slash attack risk by dumping IE

How to optimize your security budget | Web hosting provider give FCC a dose of life without net neutrality

Network World Security

Forward this to a Friend >>>


Windows XP die-hards can slash attack risk by dumping IE
By switching to a non-Microsoft browser, Windows XP users can halve the number of vulnerabilities that apply to the OS, according to a survey of flaws Microsoft fixed in the second half of 2013. Read More


WHITE PAPER: McAfee

Get Proactive About Managing Security and Risk
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis. View Now>>

WHITE PAPER: McAfee

Streamlining Response and Reaction to Attacks
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting. View Now>>

How to optimize your security budget
The good news is that security budgets are rising broadly. The bad news? So are successful attacks. Perhaps that's why security budgets averaging $4.3 million this year represent a gain of 51% over the previous year a and that figure is nearly double the $2.2 million spent in 2010 a all according to our most recent Global Information Security Survey, conducted by PricewaterhouseCoopers. Read More

Web hosting provider give FCC a dose of life without net neutrality
Federal Communications Commission a lesson by crippling the FCC's access to any page it hosts by throttling the agency's network down to 1990s-era dial-up modem speeds of 28.8 kbps. Read More

Microsoft shares 2 cybersecurity papers to protect infrastructure and supply chain
And they say crime doesn't pay...did you know cybercrime kingpins recruit new employees with incentives like a Ferrari and glamorous female assistants? This might be a good time to review if your company has the best safeguards in place. Read More


WHITE PAPER: Intigua

Systems Management Virtualization
Discover how virtualizing the management layer, by de-coupling agents from the underlying server infrastructure, eliminates the need to install physical agents on servers and makes ongoing management tasks such as provisioning and updating agents as simple as copying a single "virtual agent" file to all required servers. Read more. Learn More

10 crucial issues around controlling orbital debris, directing space traffic
What can, or perhaps more importantly should be done to control access to and prevent more debris from building up in the space around Earth? Read More

INSIDER
Step-by-step guide to documenting your network
Every network should have a customized manual of sorts with maps showing the network layout and written documentation on all the basic aspects of the network. Read More

Research gives reason to double-check Heartbleed fix
System administrators rushing to fix the highly publicized Heartbleed vulnerability may have introduced the flaw into unaffected websites, a security researcher says. Read More


WEBCAST: Brocade Communications

IT Agility: How Do You Stack Up?
Are you faced with increasing pressure to deploy technology faster? You're not alone. This year, over half of enterprises will be prioritizing building a private cloud, a concept introduced less than five years ago. View Now>>

As Patch Tuesday looms, Microsoft gives Windows 8.1 users a reprieve
For the third time in four weeks, Microsoft has backed away from a customer cutoff by postponing enforcement of the Windows 8.1 Update migration deadline until June 10. Read More

Avast: Users frequently hitting websites loaded with ransomware
Fresh statistics from the maker of a widely used free security product show the extent to which users are encountering file-encrypting malware known as ransomware. Read More

Hackers now crave patches, and Microsoft's giving them just what they want
At least one of Microsoft's Patch Tuesday updates looks like an excellent candidate to hackers as they poke around for bugs in the now-retired Windows XP. Read More


SLIDESHOWS

10 nerdiest Linux gadgets

Of all the nerdy Linux gadgets out there, these take the cake.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco's IoT chief resigns

2. 10 nerdiest Linux gadgets

3. Patch Tuesday: Microsoft fixes Internet Explorer for the second time this month

4. Step-by-step guide to documenting your network

5. Security-vendor snake oil: 7 promises that don't deliver

6. iPhone rumor rollup for the week ending May 9

7. IT malpractice: Doc operates on server, costs hospitals $4.8M

8. Android ransomware demanding $300 from porn site visitors

9. Wall Street's collapse was computer science's gain

10. Top 12 tech hoaxes of all time


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: