Search This Blog

Monday, July 19, 2010

Cisco tops in IPS: survey

  Mozilla hikes Firefox bug bounties to $3K | Safety a big target in letting unmanned aircraft in national airspace
 
  Network World Security

Forward this to a Friend >>>


Cisco tops in IPS: survey
Cisco is the "top dog" in a recent customer survey of the leading Intrusion Prevention System vendors conducted by Infonetics Research. The June survey queried IPS buyers at 105 US and Canadian companies with at least 100 employees. Read More


WHITE PAPER: MessageLabs

The Wild, Wild Web: How to Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

WHITE PAPER: MessageLabs

Top Ten Web Threats and how to eliminat
This paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department. Read Now.

Mozilla hikes Firefox bug bounties to $3K
Mozilla on Thursday boosted bug bounty payments six-fold by increasing the standard cash award to $3,000. Read More

Safety a big target in letting unmanned aircraft in national airspace
There is a push by a variety of proponents to give unmanned aircraft more free reign in the nation's airspace but safety is a Read More

Air Force streamlines cybersecurity hiring for 680 open positions
The Air Force today said its managers hiring civilian federal employees for certain cybersecurity openings can use a streamlined method to rapidly fill more than 680 positions. Read More


WHITE PAPER: Shoretel

How to Get Started with Unified Communications
Get past the hodgepodge of legacy phone systems or decentralized server-based architectures and eliminate telecommunications burdens. See why ShoreTel beats every other competitor for customer satisfaction six years in a row. Read now!

White House meeting aimed to assert cybersecurity leadership
The White House meeting on cybersecurity issues held on Wednesday appears to have been as much about assessing progress on the Presidents cybersecurity agenda as it was on showing executive office leadership on the issue. Read More

Gain the upper hand on governance and compliance with SaaS-based SecureGRC
Most of the governance, risk and compliance automation tools on the market are aimed at large enterprises with complex environments and deep resources. But smaller companies need governance and must meet compliance mandates, too. Now these companies have the option of a SaaS-based GRC solution that comes with a low subscription rate rather than a high purchase price. Read More

Visa moves to reduce payment card data in retail systems
A new payment card security initiative launched by Visa Inc. Wednesday could eliminate the need for retailers and other organizations to store full, 16-digit credit and debit card numbers on their systems. Read More


WHITE PAPER: Riverbed

345 IT Executives Interviewed
This white paper details extensive research on the challenges associated with application delivery and managing application performance. Analyst and consulting firm, Kubernan, interviewed 345 IT pros. Their responses and Kubernan's analysis will help you to proactively resolve application delivery and performance issues. Read now!

DNS gains added measure of security starting today
The 13 globally distributed server clusters -- known within Internet engineering circles as the Root Zone – will begin cryptographically signing DNS look-ups today. Read More

Some experts question efforts to identify cyberattackers
Efforts by the U.S. government to better identify cyberattackers will likely lead to violations of Internet users' privacy and anonymity, and technological means to attribute the source of the attacks may be inaccurate, privacy and cybersecurity experts said Thursday. Read More

Researchers: Password crack could affect millions
A well-known cryptographic attack could be used by hackers to log into Web applications used by millions of users, according to two security experts who plan to discuss the issue at an upcoming security conference. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Robocop ran DOS
Virtually no sci-fi or action flick these days is complete without a computer scene showing a few screens of mysterious scrolling text and a 3D wire-frame model. But where does this vaguely tech-looking stuff come from? Well, more often than not, it comes from a Website, app, or startup screen from the real world at the time the movie was made. Read on for some of the most unexpected tech cameos in movies.

Top Russian spy ring technology screw-ups
Alleged Russian spies arrested last month in cities around the United States seemed to be lacking in spycraft and in urgent need of some IT expertise, based on some of the gaffes they made. They also used some technologies effectively. Here is a summary of their efforts as revealed in court filings against them.

MOST-READ STORIES

  1. Robocop ran DOS
  2. Paper to readers: Comments now cost 99 cents
  3. Droid X vs. Droid
  4. EFF Fights To Allow People To Comment Anonymously Online
  5. Antenna guru: 'Get a bumper and learn the Vulcan iPhone Pinch'
  6. David Letterman piles on Apple's iPhone 4 problems
  7. Apple's antenna guru reportedly warned execs about iPhone 4 design
  8. India's new Rupee symbol won't show soon on computers
  9. Cisco Linksys among millions of hackable routers
  10. World's Weirdest PC Game Controllers

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: