Wednesday, July 28, 2010

What to watch at Black Hat and Defcon

  Twitter encounters more digital certificate problems | Do Not Call Registry hits 200M phone numbers
 
  Network World Security

Forward this to a Friend >>>


What to watch at Black Hat and Defcon
Trying to predict the big news at this week's Black Hat and Defcon conferences is extremely tricky, if not impossible. Usually the most interesting stories pop up at the very last minute -- hackers tend to hold off on disclosing the really big talks because they don't want jittery lawyers to shut them down. And even when you think you know what's going on, sometimes one of the shows steps forward to take center stage, as Defcon did three years ago when Dateline NBC reporter Michelle Madigan was run out of the conference for trying to secretly film show attendees. Read More


WHITE PAPER: Palo Alto Networks

Re-Inventing Network Security
Enterprise networks and applications have evolved but security infrastructure has not. Learn why application visibility and control (regardless of port, protocol, or encryption) are critical for preventing increasingly sophisticated threats that target enterprise users and data. Read now!

WHITE PAPER: Qualys

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

Twitter encounters more digital certificate problems
Twitter is having trouble again with a digital certificate that secures communications to its Web site, which has been causing trouble for third-party applications that integrate with it, but the problem may have been fixed. Read More

Do Not Call Registry hits 200M phone numbers
Stopping those unwanted telemarketing calls right as you sit down to dinner is proving to be quite popular. The Federal Trade Commission today said phone numbers in the Do Not Call Registry now exceed 200 million and since 2003, the agency h Read More

NAC decisions you need to make now
One important piece of a multilevel security defense for companies of almost any size is network access control (NAC), which lets you enforce policies for end-user machines. Read More


E-GUIDE: Force10 Networks Inc.

Examining Nuances of the Cloud
Choosing the best cloud strategy means understanding the promises and pitfalls of each approach. This Network World eGuide provides expert articles on the nuances between different cloud strategies, best practices on building a hybrid cloud and making sure you have an exit strategy in case the cloud does not work out. Read More Now

Black Hat may keep quiet about plans for controversial talks
Black Hat organizers are looking to avoid pressure from outside groups to cancel important presentations by withholding details of selected talks at future events. Read More

Black Hat: Most browsers can be made to give up personal data
All the most commonly used Internet browsers are vulnerable to exploits that can force them to cough up users' personal information that can be used to hack into bank accounts or set them up for other attacks, the Black Hat 2010 conference will be told this week. Read More

Founder: Black Hat reflects a changing industry
In the 13 years since its inception, Black Hat has emerged as one of the premier conferences in the security industry. Each year, Black Hat attracts thousands of security researchers, security practitioners and government types to its annual events in Las Vegas, Tokyo, Amsterdam and Washington. On the eve of the annual conference in Vegas, Black Hat founder Jeff Moss talks about the show and how it has evolved. Read More


WHITE PAPER: MessageLabs

The Wild, Wild Web: How to Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

Bug reporting could be a hot topic at Black Hat
How researchers report vulnerabilities -- and how companies react to those reports -- may be one of the briskest topics at this week's Black Hat security conference. Read More

A striking disconnect between CSOs and hackers
Though I've been writing about Internet security for six-plus years, there's an interesting problem in the industry that I've only noticed in the last couple years: Security executives and the hacking community tend to live in different worlds. Read More

Enterprise UTM vs next-generation firewalls
Today we have a thoughtful contribution from security expert Patrick Bedwell, vice president, product marketing at Fortinet, the well-known provider of unified threat management systems. Patrick challenges the view that next-generation firewalls are a new and superior technology to unified threat management systems (such as the ones manufactured by Fortinet). Everything that follows is Patrick's own work with minor edits. Read More

Citi confirms critical bug in iPhone mobile banking app
Citigroup has urged customers conducting mobile banking from their iPhones to immediately upgrade because a security flaw in the older app secreted account information on the smartphone. Read More

Immediate IT security action needed: Cisco
Enterprise IT professionals have been urged to "act immediately to put effective security practices into place" in order to protect their companies' reputation and maintain a competitive edge. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: Apple iOS 4 vs. Android 2.2
Apple's iOS has been wowing users for four years in the iPhone and now the iPad. Available in smartphones and now tablets from various vendors going on two years, Google's Android has proven itself to be a strong contender that has the only real chance to surpass iOS.

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. Apple grants ABC access to its secretive "black labs"
  2. WPA2 vulnerability found
  3. Cisco study warns against "FarmVille"
  4. Is Sprint losing its WiMAX/4G gamble?
  5. MIT design could speed up the Internet
  6. Certified lies: Big Brother in your browser
  7. Avaya stares down Microsoft, Cisco
  8. Black Hat too commercial for you?
  9. Mobile deathmatch: Apple iOS 4 vs. Android 2.2
  10. Should you even bother looking at Windows Phone 7?

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment