Search This Blog

Monday, September 20, 2010

8 Cloud Security Concepts You Should Know

Malicious code that comes with release notes? | Researchers issue homemade patch for PDF zero-day bug

Network World Security

Forward this to a Friend >>>


8 Cloud Security Concepts You Should Know
Cloud security isn't that hard. It's really just traditional security concerns in a distributed and multi tenant environment. The challenge for most organizations is getting past the hype of what a cloud is. Read More


WHITE PAPER: Extreme Networks

The High Performance Network for iSCSI
IT organizations have been focusing on creating a converged infrastructure to support high-performance iSCSI while allowing other applications to coexist on the network. Read now!

WHITE PAPER: Emerson Network Power

10 reasons for MergePoint Infrastructure Explorer Software.
To operate at peak efficiency, the data center manager must have immediate access to the right information. With the Avocent infrastructure planning and management solution, you can quickly realize the benefits of predictive simulation and modeling for every device in your data center. Read now.

Malicious code that comes with release notes?
I was astonished when Mike Dausin of security provider HP TippingPoint briefed me on a new state of network security report and explained how much more sophisticated writers of malicious code had become. Their code is much cleaner than it had been in years past and that recently, some updated versions of this code had actually come with release notes. Read More

Researchers issue homemade patch for PDF zero-day bug
Research firm RamzAfzar this week issued a home-brewed patch that appears to fix a critical bug in the popular Adobe Reader software. Read More

INTERPOL: International ID verification system needed
Law enforcement worldwide should focus on developing an international identity verification system, according to INTERPOL secretary general Ronald K. Noble. Read More

Google patches Chrome second time this month
Google patched 10 vulnerabilities in Chrome this week, including one pegged critical on the Mac. Read More


WHITE PAPER: Symantec

Don't Leave Your Business at Risk- Protect it Completely
The time is right for a clear assessment of your risks, and a realistic plan to address them—for your customers, your reputation, and your business future. Discover best practices for protecting your business data and the solutions available to start now by reading this guide. Read Now.

Encryption patent battle could affect database security
Data security vendor Protegrity has added new names to a lengthening list of companies it wants to sue over alleged violation of its encryption patents. Read More

Cisco, HP and Juniper don't have what it takes in the data center
Cisco's coming at the data center from a legacy of building global networks - not from any real pedigree in data center IT. So says the chief marketing officer of Brocade at the analyst conference the company hosted this week. Read More

Is Stuxnet the 'best' malware ever?
Experts say the Stuxnet malware is groundbreaking technology that may have been created with the backing of a government. Read More

US wants big, revolutionary energy storage systems
Looking for a major new ways to harness wind, solar and other evolving renewable energy, the US Department of Energy today issued a call for advanced large-scale energy stora Read More


WHITE PAPER: Aerohive

Economics of Cooperative Control: Protocols are Free
Inter-AP protocols are free, but controllers are not. Aerohive's Cooperative Control controller-less WLAN architecture delivers an immediate and extremely significant CAPEX decrease. This paper explores the expansive economic benefits of Aerohive's unique approach. Read now!

JPMorgan Chase deposits blame, sort of, for outage
JPMorgan Chase is trying to move past three days of problems on its online banking site with an apology and an explanation that seems to put the cause on a third party. Read More

Facebook poses security risk at work, study finds
A third of US SMEs claim to have experienced malware or virus infection as a result of staff using social media websites, Panda Security's first Social Media Risk Index survey has found. Read More

Intel CISO:Biggest security threat is not understanding risk
What is the most significant vulnerability that information security faces today and in the future? According to Malcolm Harkins, CISO of Intel, the biggest threat facing infosec is the misperception of risk. Read More

Boeing gets $89M to build unmanned aircraft that can stay aloft for 5 years
One of the more unique unmanned aircraft took a giant step toward reality this week when the Defense Advanced Research Projects Agency (DARPA) inked an agreement with Boeing to build the SolarEagle, a plane capable of remaining at heights over 60,000ft for over five years. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Ultimate guide to the flat data center network
The traditional three-tier network had a good run, but its age is starting to show in today's brave new world of server consolidation, virtual machines, cloud computing and 10Gigabit switches. Here's a look at where we've been and where we might be headed.

22 Best Android Apps
Here are the top productivity tools, utilities, and games for smartphones based on Google's Android OS.

MOST-READ STORIES

  1. Did Apple swat Newsday's iPad app ad off YouTube?
  2. Seven ways social nets are 'truly evil'
  3. How I got thrown out of an NSA party
  4. Malicious code that comes with release notes?
  5. How to erase digital footprints and vanish without a trace
  6. Akamai: Why our IPv6 upgrade is harder than Google's
  7. Red Hat tops list of hottest IT security certifications
  8. Stuff I learned from my three biggest network screw ups
  9. Internet Explorer 9: A visual tour
  10. VMware, others to divvy up Novell?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


3 comments:

Anonymous said...

Hello

Definitely gonna recommend this post to a few friends

Anonymous said...

top [url=http://www.001casino.com/]free casino games[/url] hinder the latest [url=http://www.casinolasvegass.com/]casinolasvegass.com[/url] manumitted no set aside hand-out at the foremost [url=http://www.baywatchcasino.com/]casino
[/url].

Anonymous said...

We [url=http://www.freecasinogames.gd]roulette[/url] have a ample library of totally unconditional casino games championing you to play privilege here in your browser. Whether you want to training a table recreation strategy or scarcely attempt exposed a insufficient new slots once playing seeking legitimate in clover, we be undergoing you covered. These are the claim uniform games that you can with at veritable online casinos and you can play them all quest of free.