Tuesday, April 13, 2010

Report rips key government security efforts

Pendulum swinging away from anonymous comments | The dirt locker: Dirty duty on the front lines of IT

Network World Security

Forward this to a Friend >>>


Report rips key government security efforts
You'd think maybe just once one of these examinations of government agency network security efforts would turn up some good news.  Not today.   Read More


ARTICLE: Sophos

FREE Data Leakage for Dummies Book from Sophos
You need to protect your company's most valuable asset – your data. Request a book today!

WHITE PAPER: Citrix Systems

Tolly Group Performance Report
Tolly Report: "Citrix NetScaler with nCore Outperforms F5 BIG-IP" shows you how Citrix NetScaler beat F5 in head-to-head tests - providing 3X faster Web traffic, lower latency and higher throughput. Learn More!

Pendulum swinging away from anonymous comments
It seems that more and more news organizations are rethinking the wisdom and value of allowing anonymous comments. And that rethinking is leading some to conclude that anonymous comments are neither as wise nor as valuable as has long been accepted. The New York Times had a story about it over the weekend: Read More

The dirt locker: Dirty duty on the front lines of IT
Seven more nasty tech jobs that make you want to bathe Read More

Send Secure Info Over the Internet
Michael Spector (and yes, he's my brother) asked how to safely email passwords, account numbers, and other sensitive information. Read More


VIRTUAL EVENT: CIO, Computerworld, CSO, InfoWorld & Network World

Live Security Panel – April 28th
Join us on April 28th for a live virtual event that will provide candid, expert advice on top security challenges and issues – all from the comfort of your desktop. Get in on the discussion - from the unique challenges presented by cloud computing and virtualization to the mass adoption of social media. Attend and you may win a Kindle!

Why Hackers Love the Cloud
The growth of cloud services has led many enterprises to move data and applications to the cloud, but the hacker community is also moving there. With content consolidation and multi-tenant infrastructures comes more opportunities for hackers to steal data or conduct DDoS attacks with greater ease. Danny McPherson, VP and Chief Security Officer at Arbor Networks, discusses some of the ways hackers are eyeing cloud services and what IT can to to face these threats. (12:51) Read More

Advanced persistent threat
The focus on security has shifted from network security to enterprise information protection, where the main point is simple: data is the focus for both the offense and the defense, and the cost of defense grows more quickly than the cost of offense. Read More

With Luxand Blink, Your Face Is Your Password
Luxand Blink! is a free product from Luxand, a maker of facial recognition and image editing software. What Blink! does is allow a PC equipped with a webcam to scan your face during the login process. If it matches a previously saved template, it will allow you to login by facial recognition instead of password. Read More


WHITE PAPER: Cisco Systems Inc.

The Full Story on WAAS Cost Saving Benefits
Wide Area Application Services (WAAS) can deliver a very favorable ROI within 11 months says Forrester Consulting in this informative report. WAAS lets you effectively choose how to deploy applications, store data and provision infrastructure services between branch and data center locations. Learn More

Virtualization and cloud security modeled on NAC
Virtualization and cloud computing have disrupted the security industry to its core. We have not quite figured out how to deal with very dynamic infrastructure while most security is implemented in a mostly static ring of devices surrounding the resources they protect. Read More

Nifty Java bug could lead to attack
A Google researcher has published details of a Java virtual machine bug that could be used to run unauthorized programs on a computer. Read More

Researcher warns of impending PDF attack wave
A design flaw in Adobe's popular PDF format will quickly be exploited by hackers to install financial malware on users' computers, a security company argued today. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

5 things we love/hate about Novell's SUSE Studio
Users might have a love/hate relationship with Novell's SUSE Studio. Here are five things we love and five things we disliked about the product.

CEO payday: What tech's top execs made in '09
The recession took its toll on tech CEOs' compensation in 2009, but not everyone lost.

MOST-READ STORIES

  1. Researcher warns of impending PDF attack wave
  2. Mystery solved: Why time stands still at 9:42 on iPhone
  3. Apple removes "Google" branding on Mobile Safari in iPhone OS 4
  4. Teleflirtation: The latest hot way to hook up
  5. Apple surprises with iPhone OS 4.0 business features
  6. Adobe Creative Suite 5 - an in-depth guide
  7. Java founder James Gosling leaves Oracle
  8. AT&T overhauls image: Is it afraid of the Verizon iPhone?
  9. In cyberwar, who's in charge?
  10. Apple bites the hand that feeds it with new app rules

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment