Wednesday, July 21, 2010

Is open source Snort dead? Depends who you ask

  Is ubiquitous encryption technology on the horizon? | Microsoft may face tough patch job with Windows shortcut bug
 
  Network World Security

Forward this to a Friend >>>


Is open source Snort dead? Depends who you ask
Is Snort, the 12-year-old open-source intrusion detection and prevention system, dead? The Open Information Security Foundation, a nonprofit group funded by the U.S. Dept. of Homeland Security (DHS) to come up with next-generation open source IDS/IPS, thinks so. But Snort's creator, Martin Roesch, begs to differ. Read More


WHITE PAPER: Red Hat

Detailed Planning Guide: SAP to Red Hat Migration
Lower costs and improve performance migrating SAP to Red Hat Enterprise Linux. Download this guide today and discover how you can perform a basic installation and migration in less than 1 day. Examine pre- and post-migration considerations and other upfront planning topics to help avoid potential problems. Read more

WEBCAST: Palo Alto Networks

60 Minutes with Security Visionary Nir Zuk
Join Nir Zuk, network security visionary and founder and CTO of Palo Alto Networks, for a live interactive online interview with security analyst Mark Bouchard, CISSP. Watch Nir speak about the state of the information security industry and then pose your toughest questions to him. Learn More!

Is ubiquitous encryption technology on the horizon?
Will ubiquitous encryption of important network traffic ever happen? A group of researchers presenting at next month's Usenix Security Symposium will talk about a technology they say could make end-to-end encryption of TCP traffic the default, not the exception. Read More

Microsoft may face tough patch job with Windows shortcut bug
Microsoft may have a tough time fixing the recently discovered Windows shortcut vulnerability, a security researcher said today. Read More


WHITE PAPER: Riverbed

Achieve Best-in-Class App Delivery over your WAN
Supporting best-in-class application performance over the WAN is possible when you follow the recommendations in this whitepaper. Success is dependant on: *Conducting cost-benefit analysis for bandwidth upgrades *Analyzing application performance for each transaction *Evaluating test results prior to the final optimization purchasing decision Read now!

Air Force streamlines cybersecurity hiring for 680 open positions
The Air Force today said its managers hiring civilian federal employees for certain cybersecurity openings can use a streamlined method to rapidly fill more than 680 positions. Read More

Operation Death Match reaps another identity thief
Federal authorities don't take kindly to people stealing the identities of dead folks. A British citizen whose real name is John Skelton this week became one of the 150 people that have been arrested and charged with federal passport fraud and related offenses under a program known as Operation Death Match. Read More


WHITE PAPER: Qualys

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

Unified security
Sometimes it seems that we are looking at cyberattacks through pinhole cameras. We apply separate tools to monitor attacks on our perimeters (firewalls and intrusion detection/prevention systems), attacks mediated through malware (antimalware products), attacks mediated by deception (antiphishing solutions) and attacks on data in motion (traffic analysis and logging for networks) and on data at rest (system and application logging). Each component contributes valuable information but we rarely seem to correlate all the data into coherent cyber situational awareness. Read More

Information Commissioner steps up FOI enforcement
The Information Commissioner has announced a range of measures that public authorities will face if they continually fail to comply with the Freedom of Information Act or the Environmental Information Regulations 2004. Read More

Microsoft Security Essentials beta out just when it's needed most
As Microsoft and everyone else running a Windows shop scrambles to thwart a "highly dangerous zero-day vulnerability," the software giant stays on schedule, today releasing a beta version of the next Microsoft Security Essentials anti-malware service. Read More

Highly Dangerous Zero-day Windows Trojan Targets Espionage
There is a new vicious rootkit-level malware infection targeting critical infrastructure and aimed at corporate or government espionage. It often enters the enterprise through USB sticks. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Robocop ran DOS
Virtually no sci-fi or action flick these days is complete without a computer scene showing a few screens of mysterious scrolling text and a 3D wire-frame model. But where does this vaguely tech-looking stuff come from? Well, more often than not, it comes from a Website, app, or startup screen from the real world at the time the movie was made. Read on for some of the most unexpected tech cameos in movies.

Top Russian spy ring technology screw-ups
Alleged Russian spies arrested last month in cities around the United States seemed to be lacking in spycraft and in urgent need of some IT expertise, based on some of the gaffes they made. They also used some technologies effectively. Here is a summary of their efforts as revealed in court filings against them.

MOST-READ STORIES

  1. New rootkit threatens all versions of Windows
  2. NASA revamps historic 9 million lb Mars antenna
  3. Windows Phone 7 'preview' winning generally good reviews
  4. Cisco to pay up to $112 million in Power-over-Ethernet patent case
  5. Security Secrets the Bad Guys Don't Want You to Know
  6. Google updates Postini spam engine to stop new JavaScript attacks
  7. 15 summer vacation ideas for geeks
  8. Dell offering free Web browser security tool
  9. Robocop ran DOS
  10. Droid X vs. Droid

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

1 comment:

  1. Great information, i really did not know about these facts before, thanks for sharing this with us.

    ReplyDelete