Tuesday, January 13, 2009

Top 25 software screw-ups; 5 Ways Employees can Sabotage Your Network

Will Top 25 list of software errors rescue you from rotten software?
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Palo Alto
rule

Palo Alto Forrester Research Webinar - Save Money on PCI
Join John Kindervag, senior analyst at Forrester Research, for a live PCI webinar on February 10. You'll discover how intelligent network segmentation can help you significantly reduce the cost and complexity of PCI audits, while effectively protecting your sensitive customer data.

rule

Spotlight Story
Top 25 software screw-ups

Ellen Messmer By Ellen Messmer
Most IT security woes, from software patching to cyberespionage and cybercrime, can be traced to the devastating effects wrought by the Top 25 programming errors made in software, according to a broad consensus of government and security firms. Read full story

Related News:

Will Top 25 list of software errors rescue you from rotten software? Will the Top 25 worst software errors list released Monday be able to rescue customers from rotten software? That's the palpable hope from some security managers who have backed the government and industry effort to identify the worst programming mistakes that lead to patch-management headaches and even cybercrime and cyber espionage.

Podcast: 5 Ways Employees can Sabotage Your Network With a poor economy and layoffs looming at a company, the most trusted employees can often turn and become an insider threat. Tim Connelly from Netcordia discusses five different ways that they can attack your network as a way for revenge or even profit (from data theft). (7:36)

Hacker leaves message for Microsoft in Trojan code Here's a new way to get Microsoft to pay attention to you: Slip a brief message into the malicious Trojan horse program you just wrote.

LinkedIn pages that promise prurient pics link to malware Hackers last week seeded LinkedIn Corp.'s business networking site with bogus celebrity profiles that link to malicious Web sites, according to security researchers.

Microsoft, Novell partnership yields identity technology Novell Monday unveiled support for a federation protocol in its identity software that represents the first fruits of its 18-month-old interoperability lab work with Microsoft as it relates to access management.

Obama Inauguration Highlights Executive Protection Between the pending presidential inauguration and roiling anti-corporate sentiment, executive protection is more critical than ever. Expert Robert Oatman explains the elements of a good program, the impact of technology, and more.

Gov't staffer might have left confidential data on bus Hong Kong's Food and Environmental Hygiene Department is following up on a possible case of confidential data leakage recently, according to a local media report.

NSA helps name most dangerous programming mistakes A group of more than 30 computer organizations has taken what some are calling a big step toward making software more secure.

Virus Bulletin lauds first antispam tests Respected malware testing organization, Virus Bulletin (VB), is to offer a new set of tests to rate the effectiveness of antispam products.

Fab tool pick: IceSword weeds out rootkits When you get beyond the fact that this tool was written in China, IceSword has a fan in blogger Jimmy Ray Purser, who has used it to circumvent a number of rootkit hiding methods.

Using Server Authentication certificates with the Remote Desktop Gateway Many people seem daunted with the concept of certificates, so Microsoft Subnet blogger Tyson Kopczynski offers a three-part series that dives into how the RD Gateway uses certificates.

Microsoft promises integrated, identity-aware security platform In an interview with John “JG” Chirapurath, director of marketing for the Identity & Security (I&S) unit at Microsoft, he discussed Identity Lifecycle Manager 2; Forefront (Stirling); Intelligent Application Gateway SP2 and Microsoft's vision for a comprehensive, identity aware platform.

Stop data leaks Yes, you can keep sensitive data from leaving your organization. Our revamped Product Guide tells you what you need to know, including 5 questions to ask data-leak protection vendors before buying.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by Palo Alto
rule

Palo Alto Forrester Research Webinar - Save Money on PCI
Join John Kindervag, senior analyst at Forrester Research, for a live PCI webinar on February 10. You'll discover how intelligent network segmentation can help you significantly reduce the cost and complexity of PCI audits, while effectively protecting your sensitive customer data.

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Executive Guide: Green IT
Download this Network World Executive Guide, "Going Green: Trends, tips and case studies," for timely, real-world advice. By adopting an effective green approach to IT you'll save your company money and even bolster company profits.
Find out how to make it happen today.

 

01/13/09

Today's most-read stories:

  1. Why Windows 7 will crush Linux
  2. Web designers admit to trashing client's Web site
  3. Outlook '09
  4. Does Apple have anything to fear from the Palm Pre?
  5. Windows 7 beta: Complete resource center to the OS
  6. Top 25 software screw-ups
  7. Palm Pre vs. Apple iPhone: How they stack up
  8. Security experts ID top 25 programming errors
  9. NSA helps name most dangerous programming mistakes
  10. Joel Snyder's take on SolarWinds' Kiwi buy


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment