Search This Blog

Thursday, August 12, 2010

Microsoft's 30-day forecast: Stormy exploits expected

  IT security pros mentoring each other for career growth | Security blunders 'dumber than dog snot'
 
  Network World Security

Forward this to a Friend >>>


Microsoft's 30-day forecast: Stormy exploits expected
Microsoft is warning customers that a record number of just-patched bugs will probably be exploited in the next 30 days. Read More


WHITE PAPER: MessageLabs

Gartner Magic Quadrant for Secure Email Gateway
This industry report covers the email gateway market. Gartner, Inc. positions Symantec Hosted Services in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention). Read the entire report. Read Now

WHITE PAPER: Tripwire

Cyberwar Threats: New Security Strategies for Governments
Threats posed by cyberwar cannot be defended using the traditional all-or-nothing security that's aimed solely at keeping attackers out of the government enterprise. Learn why Tripwire's solutions provide the real-time awareness necessary to fight cyberwar. Read More!

IT security pros mentoring each other for career growth
Information security is a tough field to break into and a growing group of information security professionals are finding that it's a whole lot easier if someone has their backs. Read More

Security blunders 'dumber than dog snot'
At the 2010 USENIX Security Symposium, a vulnerability assessor reveals some of the more egregious examples of stupidity on the part of professionals who should know better. Read More

The Policeman's New Partner: iPhone
Chances are you've never heard of the iPhone app One Force Tracker, one of the coolest apps never to appear on the App Store. The iPhone app, created by defense contractor Raytheon for the U.S. military late last year, helps soldiers keep tabs with each other via GPS during missions and identifies known sniper sites and fallback positions on a map. Read More


WHITE PAPER: Qwest

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

First malware discovered that targets Android
Researchers at Russian security company Kaspersky Lab say they've discovered the first malicious software program to target Google's Android mobile operating system. Read More

Demand Media a home to badware, researchers say
As Demand Media gears up for its initial public offering, anti-spam advocates and online crime fighters say that the company needs to clean up its act. Read More

Workarounds: 5 ways employees try to access restricted sites
Company policy may forbid access to certain web sites, but some employees try creative techniques to view them anyway. Here are five common workarounds and what security can do about them. Read More


WHITE PAPER: Qwest

Five Network Security Threats
Discover the five most costly network security threats and see how you can protect your business with a layered security approach. Read Now.

Claiming PCI or any other compliance - daily
Let's be honest: Organizations follow compliance and regulatory requirements like PCI because VISA threatens to fine your company or worse, cut you off from credit card processing. Read More

Security metric techniques: How to answer the 'so what?'
You need to be ready when the boss responds to your presentation with a "so what?" At Metricon 5, the focus is on several security metric techniques to pull it off. Read More

Record Patch Tuesday: Where to Begin
Microsoft unleashed a record number of security bulletins for a single month--14 security bulletins addressing 34 different vulnerabilities. IT admins need to understand the risks and prioritize the patches to ensure they aren't overwhelmed by the sheer volume of the patch avalanche. Read More

Browsers' private modes leak info, say researchers
Browsing the Web in "private mode" isn't as private as users think, a researcher said today. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Supersize your WAN
Dual-WAN routers have come a long way. WAN connections are easier to establish, and all units we tested have configurable load balancing. The performance increase, not to mention the redundant Internet connections that all but guarantee uptime, should put these dual-WAN routers at the top of the shopping list for every small business that needs a router.

The recent history of governments vs. the Internet
Since the Web makes it far easier to access information than ever before, governments have had a harder time keeping the lid on information they don't want the public to consume and have often found themselves butting heads with tech companies who deliver Internet services or content. Here are some doozies.

MOST-READ STORIES

  1. Google CEO Schmidt: No anonymity is the future of the Web
  2. Motorola sees opportunity in iPhone coming to Verizon
  3. Who has the better virtualization platform - VMware or Microsoft?
  4. Registry hack allows Windows XP SP2 patching
  5. Cisco execs in line for HP CEO slot?
  6. Supersize your WAN
  7. U.K. bank hit by massive fraud from ZeuS-based botnet
  8. BlackBerry Torch 9800: 10 things you didn't know about it
  9. Ted Stevens, Father of "Intertubes", said to die in plane crash
  10. Microsoft vs. VMware: Who's better at disaster recovery?

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: