Tuesday, January 06, 2009

New attack patterns emerge in 2009; Encryption top IT security initiative in 2009

New ways that hackers will be trying to get into your network in 2009
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by SonicWall
rule

Rethink your Security Strategy
Dramatic advances in remote access technology have triggered a mobile revolution. More people are working from more places using more devices than ever before. Potentially, all users are remote and all devices unsafe. Old ways of securing corporate resources have gotten more difficult, expensive and ineffective. Download this e-book now:

rule

Spotlight Story

New attack patterns emerge in 2009
Botnets were just the beginning. The bad guys will continue to use these to try and steal your data, but more sophisticated attacks over the application layer and targeted network attacks are on the way. Danny McPherson from Arbor Networks discusses the new ways that hackers will be trying to get into (and steal information from) your network in 2009 (10:30). Listen now.

Related News:

Encryption top IT security initiative in 2009 Encryption seen as biggest IT security initiative in 2009, according to a Forrester Research survey.

CA to buy data-leak prevention vendor CA Monday announced an agreement to acquire for an undisclosed sum data-leak prevention vendor Orchestria, boosting the software maker's security, privacy and compliance...

Podcast: Security Trends for 2009 The true nature of the cloud, the quagmire of data leak prevention and virtual machine blind spots are some of the security issues that IT managers will face in 2009. Sophos CTO Richard Jacobs talks with Keith Shaw about the big picture for security in the upcoming year. (16:13)

Twitter hit with phishing scam As has happened with virtually every other popular Web site over the past decade, it seems that Twitter is being used in a phishing scam.

Microsoft Tells How It Missed Critical IE Bug Microsoft developers overlooked a critical bug in the Internet Explorer browser because of a lack of adequate testing tools and training, a company official acknowledged last month.

Joshua Corman: someone to watch in '09 Corman, principal security strategist, IBM Internet Security Systems division, gets a nod for speaking candidly about the trouble facing enterprise security teams. Also: View a slide show.

Oracle’s identity management guru is someone to watch Oracle aims to be the undisputed leader in identity and access management, and Amit Jasuja, vice president of product development for identity management, is leading the charge. Also: View a slide show.

2009 prediction: He who makes fully encrypted SD and Micro SD cards wins Cisco Subnet blogger Larry Chaffin writes: Why can’t someone fully encrypt a Micro SD Card or SD Card? You would think that if someone could do this, mass sell it at Best Buy it would be a hit.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by SonicWall
rule

Rethink your Security Strategy
Dramatic advances in remote access technology have triggered a mobile revolution. More people are working from more places using more devices than ever before. Potentially, all users are remote and all devices unsafe. Old ways of securing corporate resources have gotten more difficult, expensive and ineffective. Download this e-book now:

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Executive Guide: Green IT
Download this Network World Executive Guide, "Going Green: Trends, tips and case studies," for timely, real-world advice. By adopting an effective green approach to IT you'll save your company money and even bolster company profits. Find out how to make it happen today.
Download this Executive Guide now.

 

01/06/09

Today's most-read stories:

  1. MacWorld 2009 rumors
  2. Outlook '09
  3. 9 Web sites IT pros should master in '09
  4. Juniper poaching Nortel's channels
  5. 2008's biggest tech crime stories
  6. Management must-dos in 2009
  7. AT&T-Verizon fiber showdown looms
  8. Bold 2009 tech prophesies
  9. Samsung to unveil 7mm thick TV at CES
  10. 2009 will be the year of IP video


Network Security you Need
Zero in on the hottest security technologies you need to know about in this Executive Guide, "The Evolution of Network Security." Stay out in front with the most up-to-date information on network security. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment