Search This Blog

Wednesday, February 10, 2010

Microsoft fixes 26 security holes, warns on unpatched multi-vendor SSL vulnerability

People May Be the Weakest Link in the Server Virtualization Chain | iHound aims to help you find your missing iPhone

Network World Security Alert

Forward this to a Friend >>>


Microsoft fixes 26 security holes, warns on unpatched multi-vendor SSL vulnerability
As expected, today's Patch Tuesday is a doozie. Microsoft released 13 bulletins to fix 26 vulnerabilities in Windows and Microsoft Office. This includes the first Hyper-V-specific patch. But wait, there's more. Microsoft also issued a security advisory (977377) over a publicly-known vulnerability in the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. Read More


WHITE PAPER: Trend Micro

Smarter Protection For the Enterprise
Read this IDC paper for background on today's threat ecosystem with an overview of network security threats, the impact of the threats on enterprises, and the operational challenges faced by IT. Learn more.

WHITE PAPER: Palo Alto Networks

A Practical Guide to Web 2.0 Security
This guide to Web 2.0 security is based on analysis of network traffic in over 200 organizations collected over 6 months in 2009. It details how to deploy an effective firewall to handle applications like Skype and Sametime that are capable of transferring files or apps like WebEx that enable desktop sharing. Click here.

People May Be the Weakest Link in the Server Virtualization Chain
I participated in a webinar on virtualization last week, along with Extreme Networks and Microsoft. During the session, 113 audience members were asked two polling questions. Here are the questions and the results: 1. In your opinion, which of the following factors is holding your organization back from using server virtualization more prominently throughout the enterprise? 1. Lack of virtualization... Read More

iHound aims to help you find your missing iPhone
If you're outside Moscone Center for this week's Macworld Expo, and someone hands you a "Lost iPhone" sticker, don't toss it away. It could help you track down your phone, should it ever go missing. Read More

Intel Atom netbooks get whole-disk encryption
Netbook users worried about storing sensitive data on their portables are being offered the world's first whole-disk encryption that will run useably on Intel's Atom processor. Read More


WHITE PAPER: St. Bernard

6 Steps to Evaluating Web Filtering
Web filtering that doesn't compromise network performance is just one of the critical steps when considering this technology. This paper guides you through the pros and cons of a software-based solution vs. an appliance-based filter and advises on considerations ranging from implications of your acceptable use policy to properly authenticating individuals. Read More

Websense debuts unified security architecture
Websense Tuesday announced Triton, a unified security architecture, which merges its data-loss prevention and e-mail security products, keeping much of the security-as-a-service approach it already supports, but with a common management and reporting console. Read More

Ksplice debuts zero downtime service for Linux
Ksplice officially launched its no-reboot patching service for Linux servers. Read More

US National Climate Service to manage world of climate change
In announcing the intent to form a National Climate Service, the Commerce Dept. said the service will provide critical business and community planning information about climate changes. Read More


WEBCAST: Tripwire

Why Regulations Aren't Enough
The entities that create and enforce regulations do not know your business. That's why meeting compliance requirements such as SOX or HIPAA are just a starting point to securing your data. Hear security expert and author, Jennifer Bayuk, as she discusses best practices for IT security. Learn more.

'Political hacktivism' surged in 2009, says report
Last year, the web saw a surge in 'political hactivism' or politically-motivated attacks on the internet, says McAfee. Read More

More evidence of value of security certification
This is the second of five articles discussing the benefits (if any) of security certifications in the job market. In the first article, a number of studies suggested that certifications do indeed improve prospects for hiring and higher salaries. Read More

Adobe apologizes for 16-month-old Flash bug
Adobe apologized over the weekend for letting a 16-month-old bug in Flash Player languish without a patch, even though it updated the popular plug-in four times since the flaw was reported. Read More

Cisco joins growing laundry list of entities paying Melissa Hathaway to be senior security advisor
Tomorrow at 2:00 PM Pacific Time, Cisco will officially announce paying Melissa Hathaway (best known for authoring the Obama White House treatise - Cyberspace Policy Review), to be a senior adviser to its security team. Hathaway appears to be cashing in on her government contacts. View the growing laundry list of entities paying Hathaway to be a senior security advisor: Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

10 coolest experiments from Google Labs
When you've got thousands of the world's most brilliant engineers spending 20% of their time on whatever takes their fancy, cool software is the result.

7 social SharePoint apps built in a week
Seven startups competed to develop great SharePoint apps in one week.

MOST-READ STORIES

  1. How to make new stuff from your piles of obsolete tech
  2. Why your computer sucks
  3. 10 recession-proof IT skills
  4. Juniper execs share network vision
  5. 9-year-old plots his fifth Microsoft certification
  6. 10 best IT jobs right now
  7. Start-up links VMware with Amazon to create secure cloud storage
  8. YouTube worth watching
  9. Cisco to unleash data center extensions
  10. 61 CCIEs dropped out of Cisco's coveted cert program

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: