Tuesday, June 08, 2010

Is Open Source Safe?

Security Manager's Journal: Without patch management, you are nothing. | Trend Micro makes push into desktop virtualization security

Network World Security

Forward this to a Friend >>>


Is Open Source Safe?
The IT Department where Daniel Toth works won't let him use open source software because they believe it's a security risk. Is it? Read More


WHITE PAPER: Tripwire

Log Mangement in a Cyberworld
Cybercrime, increasingly operated under well-muscled organized crime syndicates, has become a huge threat. With so many potential cyber villains poking around the gates, enterprises must have strong protections and pristine visibility into what's happening on the network. Read Now

E-GUIDE: Compuware

Perfecting Application Performance
The enterprise application scene has become increasingly complicated over the years. Things have changed with the rise of Web services, SOA, Virtualization and cloud computing. In this Executive Guide explore how to get the best performance out of today's application environments. Read Now.

Security Manager's Journal: Without patch management, you are nothing.
Does it all come down topatch management? As a security manager, I pursue many initiatives, striving to protect the company on many fronts. But patch management is a key metric of our risk exposure, since there is a direct correlation between security incidents and patch compliance. So, in a way, it does all come down to something as basic as patch management, because if we fail there, we can't be secure. Read More

Trend Micro makes push into desktop virtualization security
Trend Micro Monday is announcing an updated endpoint security product designed to go beyond protecting Windows environments to safeguard virtualized desktops based on Citrix XenDesktop and VMware View. Read More

Protect Your PCs Against Adobe Security Flaws
Adobe has been very successful at establishing its products as cross-platform, operating system agnostic tools for delivering content. Unfortunately, those same attributes are also attractive reasons to attack Adobe products, and Adobe has been a little less successful at ensuring those products are secure. IT administrators need to exercise increased diligence to protect against Adobe software flaws and malicious PDF files. Read More


WHITE PAPER: Tripwire

5 Challenges: Continuous PCI DSS Compliance
With adoption of the PCI DSS expanding throughout the United States and into Europe, organizations subject to PCI compliance face several key challenges. Learn more about these challenges, how to address them, and how Tripwire IT security and compliance automation solutions can help. Read Now.

One third of search engine results are poisoned
A third of search engine results are poisoned links, says Symantec . Read More

Quick tips to foil Mac break-in attempts
As Mac users, many of us don't spend as much time worrying about security as our counterparts on other platforms. While it's true that Macs don't encounter as much malware as Windows, though, it hardly means we're immune from security risks, as I discovered myself this week. Read More

McAfee vs. Symantec
For decades, Symantec and McAfee have fostered a tit-for-tat rivalry that makes the old Hatfields and McCoys feud look tame by comparison. Read More


WHITE PAPER: Novell

Intelligent Storage Management at the File Level
Many storage management tools for file storage are "dumb." They treat all files the same regardless of business relevance and they lack the ability to automate user-storage management tasks or set policies based on business requirements. Learn how to augment your existing storage management system with intelligence at the file level. Read Now

Why Google's Windows Ban Doesn't Make Sense
Google's move to ban Windows for internal use was ostensibly for security reasons. But that looks more like a convenient excuse than anything else, because there are plenty of reasons the ban doesn't make sense. Read More

Missouri AG looks into Google Wi-Fi mess
Missouri's Attorney wants Google to answer questions about how the company's widespread wireless network sniffing activities may have affected local residents. Read More

Update: Attackers exploit critical bug in Adobe's Flash, Reader
Adobe late Friday warned that attackers are exploiting a critical vulnerability in the company's most widely-used software: Flash Player and Adobe Reader. Read More

Bugs & Fixes: Router's network password can slow Wi-Fi
Is the speed of your 802.11n Wi-Fi network unexpectedly slow--more akin to the rate you used to get with a 802.11g network? There are numerous possible causes. Most of them boil down to poor signal strength--due to causes such as your Internet device being too distant from the Wi-Fi router or interference from a cordless phone. Read More

How to Set Up a Virtual Private Network
If you work on the go fairly often, you've probably hopped on a public wireless network at least once or twice. You should have also figured out how to keep your data safe when you're on such a network, by taking precautions such as using your company's virtual private network--if available--or an encrypted Web tunnel such as Hotspot Shield. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

10 useful Firefox-based apps
Here are 10 useful desktop programs that run on the open-source Web browser's native technology. All of these applications are free for you to download and use -- and only one is a Web browser.

Steve Ballmer as emoticons
It's not often hard to guess what Steve Ballmer is feeling. The Microsoft CEO has one of the most recognized, and photographed, faces in the IT industry - and it's also one of the most expressive.

MOST-READ STORIES

  1. AT&T introduces new data plans ahead of iPhone 4G launch
  2. Guess who didn't get an invite to this year's WWDC
  3. Microsoft plans gigantic Patch Tuesday next week
  4. What Steve Jobs has in store for the iPhone
  5. Networking's 20 greatest arguments
  6. Android rootkit is just a phone call away
  7. Dear (name of boss): Microsoft wrote this letter for me
  8. Five not so crazy iPhone predictions for 2011
  9. What to expect from Apple and Steve Jobs at WWDC
  10. Five things to pass along to new networkers

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment