Friday, April 17, 2009

Security threats: Good, bad and ugly; Black Hat 'supertalk' halted due to vendor concerns

"April Madness": Colleges to duke it out over IT security
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Windows Server 2008 Remote Infrastructure
Microsoft has launched the most advanced Windows Server operating system yet: Windows Server 2008. Dell closely collaborated with Microsoft during development, gaining expertise in all aspects of its features and functionality, including key advancements in the management of remote infrastructures.

rule

Spotlight Story

Security threats: Good, bad and ugly
Zulfikar Ramzan, technical director of Symantec Security Response, breaks down key statistics from the vendor's annual Threat Report. (9:44) Listen now.

Related News:

RSA Conference news preview

Microsoft discloses ambitious security strategy Microsoft Thursday began detailing a security strategy that will see it combine its identity management efforts with its Forefront security products built for clients, servers and the network edge. Microsoft will further dissect the plan, which uses Active Directory as its foundation, at next week's RSA Conference under the marketing banner Business Ready Security.

Cloud Security Alliance formed to promote best practices A group calling itself the Cloud Security Alliance announced its formation Tuesday, with eBay and ING as founding members. The alliance, which plans to make its first big splash at the upcoming RSA Conference, was formed to promote security best practices in a cloud computing environment.

HP Software bolsters application-scanning products HP Software Wednesday updated its security products to help customers scan Web-based applications for vulnerabilities. On display at HP's booth during next week's RSA Conference in San Francisco, WebInspect 8.0, HP's Web-application scanning tool, has been upgraded to support vulnerability scans of Adobe Flash and Web 2.0 technologies.

Other security news

Black Hat 'supertalk' halted due to vendor concerns The Black Hat security conference is full of drama again in Amsterdam, with the last-minute cancellation of a presentation by a group of researchers scheduled to reveal a dangerous software vulnerability.

Researcher finds possible bug in Apple's iPhone Famed Mac hacker Charlie Miller has found another possible security vulnerability in Apple's iPhone.

Call it "April Madness": Colleges to duke it out over IT security The University of Texas at San Antonio (UTSA) this weekend will host the 4th annual National Cyber Defense Competition, as an elite eight college teams will battle to see which is best at protecting data from would-be hackers.

Study: Mistakes, Not Insiders, to Blame for Most Breaches 2008 was a banner year for security breaches, according to new research from Verizon. And while many security vendors have been banging the drum about the threat of malicious insiders, this report indicates organizations should be more wary of outside attacks (Read Senior Editor Bill Brenner's take on the insider threat in Laid-off Workers as Data Thieves?)

DOJ: US government exceeded surveillance authority The U.S. National Security Agency (NSA) exceeded its surveillance authority of U.S. residents under a far-reaching telephone and Internet communications wiretap program, the U.S. Department of Justice said Thursday.

Cybercriminals target ISPs in developing APJ countries Recent research by information security vendor Symantec has shown that Internet service providers (ISP) in developing countries in the Asia Pacific and Japan region are at risk of being targeted by cybercriminals.

The state of spam 2009, Part 3 Cloudmark CTO Jamie de Guerre continues his response to the question of what has changed in the battle against spam in the last year, discussing free content-hosting services, compromised accounts at Webmail providers and new-media spam.

Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Dell
rule

Windows Server 2008 Remote Infrastructure
Microsoft has launched the most advanced Windows Server operating system yet: Windows Server 2008. Dell closely collaborated with Microsoft during development, gaining expertise in all aspects of its features and functionality, including key advancements in the management of remote infrastructures.

rule

DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips


Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.

 

04/17/09

Today's most-read stories:

  1. Forced week off at Adobe not exactly a vacation
  2. PBX killer, Voice CAL coming to OCS in 2010
  3. Stanford's Cinder OS tightens mobile phone control
  4. Exchange 2010: Sneak peek
  5. What's the carbon footprint of spam?
  6. NASA takes Ethernet deeper into space
  7. Managing IP addresses with free tools
  8. Microsoft's Patch Tuesday filled with zero-day exploits
  9. Stealthy rootkit slides further under the radar
  10. Breakthrough enables Terabit Ethernet
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Responsible for building a resilient data center
Then don't miss Network World's one-day conference and expo devoted to best practices and new solutions. Hear top analysts. Meet key vendors. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Register now to attend free.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment