Thursday, June 17, 2010

DNS security reaches 'key' milestone

  Four critical US cybersecurity projects that need constant pressure | AT&T reportedly bungles handling of private data, again
 
  Network World Security

Forward this to a Friend >>>


DNS security reaches 'key' milestone
The dream of bolting security onto the Internet's Domain Name System takes one step closer to reality Wednesday as Internet policymakers host a ceremony in Northern Virginia to generate and store the first cryptographic key that will be used to secure the Internet's root zone. Read More


WHITE PAPER: Cisco Ironport Systems

Learn the 3 Best Practices for Securing E-mail
Any IT manager will tell you it's critical to protect data. With information flowing freely today via mobile devices, collaboration technologies and unified communications, it isn't easy. Learn data leak prevention (DLP) triage and the steps to protect proprietary data in e-mail, while also complying with government and industry regulations. Read now!

RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

Four critical US cybersecurity projects that need constant pressure
When it comes to our nation's information systems and cyber infrastructures, the hackers never stop trying to smash it and the government should never stop trying to protect it. Read More

AT&T reportedly bungles handling of private data, again
This hasn't been AT&T's month. First, security researchers found a loophole in the company's Web site that could be used to reveal e-mail addresses for tens of thousands of Apple iPad customers. Now, some users are reporting that when they log in to their AT&T accounts to pre-order the iPhone 4 they are apparently given access to the account information of other people. Read More


WHITE PAPER: Aerohive

Deploying a Secure WLAN
This paper walks through the steps to build a highly-secure wireless LAN and explains the technical considerations for: • Wireless privacy • Authentication • Client management and NAC • Network firewall and intrusion detection and protection • Identity-based access control • Rogue detection and WIDS • Compliance Read more!

3.7 billion phishing emails were sent in the last 12 months
Cybercriminals sent 3.7 billion phishing emails over the last year, in a bid to steal money from unsuspecting web users, says CPP. Read More

Location-Aware Apps: Will We Lose Privacy Location Forever?
Read More


WHITE PAPER: VMware

Quantifying the Business Value of VMware View
The paper is an analysis of organizations adopting a centralized virtual desktop (CVD) computing environment with the use of VMware View. It demonstrates that investment in the technology can result in significant business value with very high return on investment (ROI). Learn more.

Data Protection: EnergySec's plan for key infrastructure
Energy companies rely on IT infrastructure more than ever. Would-be cyber terrorists know it. A group called EnergySec hopes to be ready for what may come. Read More

Information Commissioner slams two more NHS organisations
Two more NHS organisations have been slammed by the Information Commissioner's Office (ICO) today for data breaches. Read More

Privacy add-ons merged to create powerful tool
A browser extension for Firefox has been combined with a set of privacy applications that give users more control over how their personal information is shared online. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

A brief history of smartphones
How the smartphone went from a high-end enterprise device to an everyday consumer staple.

Summer gadget guide 2010
From a solar-powered watch to a speaker for your bike helmet and a nifty geocache finder, these 10 high-tech toys are perfect for summer.

MOST-READ STORIES

  1. Dell says Ubuntu is safer than Windows
  2. The truth about the faces in your Facebook ads
  3. Wikipedia to unlock frequently vandalized pages
  4. Hackers exploit Windows XP zero-day, Microsoft confirms
  5. Linux trojan raises malware concerns
  6. Xbox Project Natal is now called Kinect and looks amazing
  7. SCO: So die already!
  8. Put your 'crapplications' into the cloud, experts suggest
  9. Is voice over Wi-Fi out of gas?
  10. Your tech vendor's been gobbled up: Now what?

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment