Search This Blog

Monday, January 05, 2009

Blurring the lines makes security more difficult; Hot security technologies and predictions for 2009

Making security policies more flexible to fit the new ways we work
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Alcatel-Lucent
rule

Reduce Risks with SOA Governance
Support scalable SOA governance and meet your compliance requirements. Respected analyst Andreas Antonopoulos from Nemertes Research along with experts from HP and Alcatel-Lucent will explain how in this on-demand Webcast. Watch now.

rule

Spotlight Story

Blurring the lines makes security more difficult
Things like Web 2.0 and unified communication applications as well as virtualization all make securing an enterprise network more difficult. Nemertes' Andreas Antonopoulos explains how security policies and systems need to become more flexible to fit the new ways we work. (10:28) Listen now.

Related News:

On botnets, encryption and mega-worms: Security predictions for 2009 My predictions for information security in 2009 are just predictions, not recommendations. I am trying to guess what will happen, not suggesting what should. As always, take these with a grain of salt.

Data protection: hot technology for '09 In a device-happy world, IT execs need to focus on protecting data wherever it resides.

Google on the prowl, Web attacks increase, social networks unravel: All part of bold 2009 prophesies 2008 is nearly spent, but there’s no shortage of forecasts for the coming year -- including the idea that some unemployed IT pros may soon turn to life of crime.

With Gaza conflict, cyberattacks come too The conflict raging in Gaza between Israel and Palestine has spilled over to the Internet.

Securing DNS should trump budget-cutting for enterprise IT, experts say With economic concerns weighing heavy on enterprise IT executives' minds in 2009, revamping DNS systems might not seem like a top priority. Infoblox offers reasons why DNS should stay top-of-mind in 2009.

Researchers devise undetectable phishing attack With the help of about 200 Sony Playstations, an international team of security researchers have devised a way to undermine the algorithms used to protect secure Web sites and launch a nearly undetectable phishing attack.

Security vendors ready fix for 'Curse of Silence' SMS attack A single malformed text message can prevent some Nokia smartphones from receiving further messages via SMS (Short Message Service) -- and the offending message can be sent from almost any Nokia phone, even non-smartphone models, a German security researcher demonstrated Tuesday.

Hacker demos reliable Cisco IOS exploit Security researcher Felix 'FX' Lindner of Phenoelit on Monday gave the first public demonstration of a reliable technique for exploiting buffer overflows in Cisco IOS routers.

Watch out for hidden cookies By now, most of us are aware of the potential privacy risks posed by Web cookies. But according to a new paper published by security consultancy iSec Partners, traditional browser-based cookies aren't the only technology used to store user data anymore. A number of browser plug-ins offer similar capabilities -- and because plug-ins are nonstandard browser components, users are often unaware that these silent conversations are even taking place.

Cisco Wireless IPS gets overhaul The new system integrates features into the Cisco Unified Wireless framework that were previously only found in specialized WIPS vendors like AirDefense.

Network access control: hot technology for '09 NAC has reached a turning point, with standards battles ended and enterprises ready to deploy to move on to the next step with this security technology.

Microsoft downplays Windows Media Player bug Microsoft today dismissed reports of a critical vulnerability in its Windows Media Player, saying that the researcher who claims the bug could be exploited is wrong.

Norton 360 expands backup and security capabilities Version 3.0 of Symantec's Norton 360 desktop software, available in beta, includes new backup and security capabilities.

Podcast: Top Cyber-Threats for 2009 Our resident security prognosticator, Mike Paquette from Top Layer Networks, joins us again to review his 2008 predictions in the world of cyber-crime (he did pretty well) and gazes into the crystal ball for 2009, including the prediction that we could be seeing the end of the "trusted" Web site. (13:47)

Three Global Risks to Business in 2009 Anyone who reads the headlines these days knows the world is an uncertain place. And 2009 will be one that brings even more changes and uncertainty, according Control Risks, an independent, specialist risk consultancy.

Microsoft kicks fake security software off 400,000 PCs In the second month of a campaign against fake security software, Microsoft has booted the rogue application "Antivirus 2009" from almost 400,000 PCs, the company recently claimed.

Software executive sentenced for hacking The president of a U.S. software company has been sentenced to probation after pleading guilty to stealing password-protected files from a competitor.

Secure Your Vista PC in 10 Easy Steps While Windows Vista may be Microsoft's most secure operating system ever, it's far from completely secure. In its fresh-from-the-box configuration, Vista still leaves a chance for your personal data to leak out to the ...

Nokia offloads security business to Check Point Nokia has finally found a buyer for its profitable security appliance business. From the first quarter of 2009, the division will belong to partner Check Point, the companies have announced.

RIM's Certicom takeover bid hits a snag With barely two weeks to go before the end of the year, Research in Motion's (RIM) $54 million hostile takeover bid for encryption specialist Certicom Corp. has hit a snag.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


2008 Holiday Gift Guide
Products of the WeekFrom phones to computers to the hottest video games, we've got a bunch of great gift ideas.

Top Microsoft Shop Tools
8 little-known technologies that instantly make Microsoft shops run smoother8 little-known technologies that instantly make Microsoft shops run smoother.

Sponsored by Alcatel-Lucent
rule

Reduce Risks with SOA Governance
Support scalable SOA governance and meet your compliance requirements. Respected analyst Andreas Antonopoulos from Nemertes Research along with experts from HP and Alcatel-Lucent will explain how in this on-demand Webcast. Watch now.

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Executive Guide: Green IT
Download this Network World Executive Guide, "Going Green: Trends, tips and case studies," for timely, real-world advice. By adopting an effective green approach to IT you'll save your company money and even bolster company profits. Find out how to make it happen today.
Download this Executive Guide now.

 

01/05/09

Today's most-read stories:

  1. IE lost share to Firefox, Safari and Chrome in December
  2. 9 Web sites IT pros should master in '09
  3. AT&T-Verizon fiber showdown looms
  4. New Androids march into view
  5. 15 amazing Web apps built in 48 hours
  6. FBI issues code cracking challenge
  7. Shanghai woman detained over adult Internet video
  8. Bold 2009 tech prophesies
  9. Juniper poaching Nortel's channels?
  10. With Gaza conflict, cyberattacks come too


Network Security you Need
Zero in on the hottest security technologies you need to know about in this Executive Guide, "The Evolution of Network Security." Stay out in front with the most up-to-date information on network security. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: