Monday, August 09, 2010

Smartphone wave challenges enterprise security

  Privacy Wars: How to Hide While Google is Watching You | Zeus malware used pilfered digital certificate
 
  Network World Security

Forward this to a Friend >>>


Smartphone wave challenges enterprise security
With ever more employees clamoring to use smartphones for both personal and business purposes, IT and security managers are forced to answer tough questions. Read More


WHITE PAPER: MessageLabs

Gartner Magic Quadrant for Secure Email Gateway
This industry report covers the email gateway market. Gartner, Inc. positions Symantec Hosted Services in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention). Read the entire report. Read Now

WHITE PAPER: Quest Software

Choosing the Right Active Directory Bridge Solution for You
A solid Active Directory (AD) bridge in your diverse IT environment allows Unix, Linux and Mac systems to coexist with a Windows infrastructure. Further, it consolidates countless identities and passwords for improved security and productivity (and reduced complexity and cost). Read More

Privacy Wars: How to Hide While Google is Watching You
You know Google is constantly collecting vast information on you, but do you truly know much or how to hide? If you use Gmail, Google knows every email that you ever received, sent, or saved as a draft, even if you deleted it. Read More

Zeus malware used pilfered digital certificate
Researchers at Trend Micro have found that a widespread piece of malware used a digital certificate from a competing security company's product in an attempt to look legitimate. Read More

IT security auditors are NOT evil and could keep you from getting hacked
As I sit here writing my first blog entry, while attempting to recover from a week in Las Vegas spent taking in the sights, sounds, and insanity that only Black Hat and DEF CON can inflict on a mere mortal (robots and ninjas are immune, or so I have been told), I can't help but to be amazed by how many security issues could be prevented with a strong security auditing and assessment program. Read... Read More


WHITE PAPER: Cisco

Learn the 3 Best Practices for Securing E-mail
Any IT manager will tell you it's critical to protect data. With information flowing freely today via mobile devices, collaboration technologies and unified communications, it isn't easy. Learn data leak prevention (DLP) triage and the steps to protect proprietary data in e-mail, while also complying with government and industry regulations. Read now!

More than 1 in 10 Mozilla bug finders turn down cash
The open-source Mozilla project has been offering cash bounties for security bugs for six years now, but often bug finders simply turn down the cash. Read More

Mozilla plans to silently update Firefox
Taking a page from Google's playbook, Mozilla plans to introduce silent, behind-the-scenes security updating to Firefox 4 -- but only for Windows users. Read More

Adobe Scrambles to Fix PDF Flaw
Adobe is rushing to develop a patch for a vulnerability in Acrobat Reader revealed at the Black Hat security conference. The update--expected the week of August 16--will be the third time this year that Adobe has been forced to fix flaws outside of its regularly scheduled quarterly update pattern. Read More


WHITE PAPER: NetApp

ESG Report: Driving storage efficiency in SAN environments
This ESG paper outlines the considerations for architecting an efficient SAN data storage infrastructure with a focus on the NetApp solutions for increased utilization, improved performance and streamlined protection to reduce operational costs. Read More!

Web add-ons compromise 'private browsing'
Security researchers have revealed that 'private browsing' modes on web browsers, which are designed to remove all traces of the sites a user has visited, can leak information. Read More

Employees ignore IT security: survey
New global research has found that most IT security administrators believe social networking, Internet applications and widgets have significantly lowered the security posture of their organisation. Read More

DHS quietly dispatching teams to test power plant cybersecurity
The Department of Homeland Security is quietly creating teams of experts charged with assessing the cybersecurity needs of power plants in the U.S. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Nine real iPad alternatives
Even since Apple released its "magical and revolutionary" iPad, other vendors have been scrambling to deliver products that go Apple one better. Here are nine that are expected to hit the stores this year.

Defcon badge is unlike anything you have ever seen
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a look at this year's badge.

MOST-READ STORIES

  1. Microsoft slates record-setting monster Patch Tuesday next week
  2. Cisco firewalls hit again by DoS condition
  3. More than 1 in 10 Mozilla bug finders turn down cash
  4. Android 2.2 on Motorola Droid: First impressions of Froyo
  5. Android 2.2: How to install Flash on Froyo
  6. Google Wave washes out
  7. Smartphones as credit cards: Possibly dangerous, definitely inevitable
  8. Wall Street wants these tech skills
  9. RIM BlackBerry Torch 9800: A visual tour
  10. Hackers find a new target in payroll processing

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment