Tuesday, July 13, 2010

Review: Firewall operations management

  Researchers unsheathe new tool to battle botnets | Happy Hackers' Heaven On The Horizon
 
  Network World Security

Forward this to a Friend >>>


Review: Firewall operations management
Anyone running multiple firewalls in a complex, enterprise environment knows how difficult it can be to catch misconfigurations, avoid conflicting rules, identify vulnerabilities and meet auditing and compliance mandates. Read More


WHITE PAPER: Qualys

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

WHITE PAPER: Radware

New Threats Require Real-Time Protection
First generation IPS devices match patterns (or "signatures") of known attack vulnerabilities to safeguard networks. However, a significant amount of threats are dynamic and not addressable by static signature-based IPS devices. Read More Now

Researchers unsheathe new tool to battle botnets
While many botnets such as Storm, Kraken and Conficker can carry out their destructive campaigns without detection or any particular means to stop them, a group of researchers says it has come up with a way to use a botnet's own techn Read More

Happy Hackers' Heaven On The Horizon
After Tuesday, July 13th, happy attackers will take advantage of your procrastination and target millions of businesses and individuals still running Windows XP SP2 and Windows 2000. All that low hanging fruit will cause a feeding frenzy and heaven for malicious hackers is on the horizon. Read More

The White House plan to safeguard cyberspace
The plan to "reduce cybersecurity vulnerabilities and improve online privacy protections" floated in June by Howard Schmidt, the Cybersecurity Coordinator and Special Assistant to the President, is comprehensive and an important step in the right direction. Read More


WHITE PAPER: MessageLabs

Employee Web Use and Misuse:
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection. Read Now

The virtual blind spot
Malicious hypervisors. Subversive virtual machines. Live migration impersonators. Welcome to the world of server virtualization, where the threats are new and the traditional security tools like firewalls and intrusion-prevention systems don't cut it anymore. Unfortunately, at many enterprises, security strategies haven't kept pace with the shift to x.86 server virtualization http://www.networkworld.com/supp/2010/ndc2/032210-ndc-tools-trends.html?source=nww_rss . "Many companies that have virtualized environments haven't contemplated the security ramifications of what they're doing yet," says Forrester analyst John Kindervag. Read More

Network security essentials
Network security problems are part of daily IT life these days. There are myriad issues, from patching Windows machines to stopping worms and protecting your assets from nasty insider threats. Here's a round up of the hottest recent network security news. Read More

Case study: Hungry for virtual server security
When it comes to sampling innovative technology, Schwan Foods, a multibillion-dollar frozen food producer, digs right in. Read More


WHITE PAPER: MessageLabs

Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

The challenges of cloud security
Some IT execs dismiss public cloud services as being too insecure to trust with critical or sensitive application workloads and data. But not Doug Menefee, CIO of Schumacher Group, an emergency management firm in Lafayette, La. Read More

Covert investigations 3: covert surveillance setup
With our new low lux camera and high resolution, 30 fps DVR delivered to the office after reading Covert investigations: cameras and recording devices, it's time to catch our finger-painting bad guy who is still targeting the late night halls of the corporate office. Read More

Oracle to issue 59 critical patches
Oracle on Tuesday will release 59 patches to fix security weaknesses affecting hundreds of products, according to a notice on its Web site. Read More

Newest Attack on your Credit Card: ATM Shims
Shimming is the newest con designed to skim your credit card number, PIN and other info when you swipe your card through a reader like an ATM machine. The shim is the latest attack being used by criminals to steal your credit card info at the ATM or other Pin Entry Device. According to Diebold, " The criminal act of card skimming results in the loss of billions of dollars annually for financial institutions... Read More

How savvy firms monitor customers' online chatter
People react to the Publishers Clearing House sweepstakes in one of three ways: Some hope that the next knock on the door will be a member of the company's Prize Patrol carrying a giant check; some think the whole thing is a joke; and others exploit its brand for scams. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

Quiz: Do you know IT security?
Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more.

Your Next Laptop: Concept Designs Point the Way
Tomorrow's models may roll up, sport multiple screens or be repositionable, Transformer-style.

MOST-READ STORIES

  1. Java supplants IT security as most sought-after tech skill set
  2. iPhone 4 "bursts into flames!" Probably the antenna
  3. Apple unveils four new iPhone 4 commercials, all feature Facetime
  4. SIP trunking: A primer
  5. Hacker claims to have cracked Skype protocol
  6. Droid X, iPhone drive data usage and pricing shifts
  7. Researchers tout new weapon in Internet censorship arms race
  8. Military wants Holy Grail of secure encryption technology
  9. How to keeps Windows XP SP2 safer after Microsoft stops patching
  10. Cisco warns attendees that the Cisco Live database was hacked

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment