Tuesday, September 28, 2010

Biggest insider threat? Sys admin gone rogue

6 tips for guarding against rogue sys admins | 5 problems with SaaS security

Network World Security

Forward this to a Friend >>>


Biggest insider threat? Sys admin gone rogue
What's one of the biggest insider threats to the corporate network? The high-tech folks that put it together, make changes to it, and know more about what's on it and how it works than anybody else. When the database, network or systems administrator goes rogue, stealing data http://www.networkworld.com/news/2007/070307-fidelity-national-records.html?nlhtsec=0702securityalert4&, setting up secret access for themselves, even in anger planting logic bombs to destroy data http://www.usdoj.gov/usao/nj/press/files/du1217_r.htm, or just peeking at sensitive information http://www.networkworld.com/news/2010/070710-snooping-protected-data.html they know is off limits, they become the very insider threat that the IT department is supposed to be guarding against. Read More


WHITE PAPER: NetGear

The Role of the Internet in the Propagation of Malware
Internet tools have dramatically changed the face of the business world, adding extraordinary efficiency and productivity. Unfortunately, these same benefits have also been realized by malware authors, making it increasingly easy for anyone, anywhere, to spread malware. Learn more.

WHITE PAPER: IBM

Forrester – Your Enterprise Database Security Strategy 2010
Enterprises must establish a database security strategy that goes beyond authentication, authorization and access control. The key to successful database security is knowing why you're protecting each database, which databases to protect, and how best to secure data against all types of threats. Read now

6 tips for guarding against rogue sys admins
One of the biggest threats that organizations face is losing sensitive data -- such as payment card or personally identifiable information about customers or employees -- to theft from their own employees. The threat is greatest from systems and network administrators, who have privileged access to vast amounts of corporate data and are responsible for most compromised records in insider cases. Read More

5 problems with SaaS security
As interest in software-as-a-service grows, so too do concerns about SaaS security. Total cost of ownership used to be the most frequently cited roadblock among potential SaaS customers. But now, as cloud networks become more frequently used for strategic and mission-critical business applications, security tops the list. Read More

The 17 Most Dangerous Places on the Web
Those photos of Jessica Alba may be murder on your PC. That Google search result that looks as if it answers all your questions may do nothing but create a serious tech headache. The fun you had watching that hilarious video you downloaded may not be worth the misery it can cause your system. Read More


WHITE PAPER: Watchguard

Unified Threat Management - Market Review
Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming. Read now!

NSA rings up a $1.2B,1 million sq-ft data center
Massive National Security Agency data center to land in UtahWhat does one stuff into a $1.1 billion, 1 million-square-ft data center?  Well the super secret National Security Agency won't tell you exactly but this week it awarded the contract to start building one in Utah. Read More

Five-year plan: 8 problems IT must solve
You can't march into the future dragging old problems that should already have a solution. Here's what must be done Read More

Iran admits Stuxnet worm infected PCs at nuclear reactor
Although some computers at Iran's Bushehr nuclear reactor were infected by the Stuxnet worm, none of the facility's crucial control systems were affected, Iranian officials said. Read More


WEBCAST: Palo Alto Networks

60 Minutes with Security Visionary Nir Zuk
Join Nir Zuk, network security visionary and founder and CTO of Palo Alto Networks, for an interactive online interview with security analyst Mark Bouchard, CISSP. Watch Nir speak about the state of the information security industry. Learn More!

NSF funds research to make the Internet more secure, robust
The National Science Foundation late last month announced four research projects focused on developing a more robust and secure Internet. Read More

Fight insider threats with the tools you already have
Common security tools already used by many businesses can be effective means for finding corporate data thieves and saboteurs, according to researchers at Carnegie Mellon's Software Engineering Institute. Read More

Snort rival launches threat-detection start-up
Emerging Threats Pro debuted Monday with a rival intrusion detection and prevention signature technology to vendor Sourcefire, which shepherds open source Snort and its threat-detection signature base. Read More

Spammers hit email users with new html attack
Spammers have suddenly cranked up the use of malicious html file attachments in recent days, according to security company Barracuda Networks. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

5 Strange Ways iPhones Die: Insurer Hears it All
What do toilets, beer and elevators have in common? They all send many iPhones to their death, says consumer electronics insurer Worth Ave. Group, which shared some unfortunate tales of iPhone disaster.

Ultimate guide to the flat data center network
The traditional three-tier network had a good run, but its age is starting to show in today's brave new world of server consolidation, virtual machines, cloud computing and 10Gigabit switches. Here's a look at where we've been and where we might be headed.

MOST-READ STORIES

  1. Don't blame DNS for Facebook outage, experts say
  2. The Microsofting of Juniper Networks
  3. Clubbing baby seals is GPL-compatible: Why Oracle can do better
  4. Man gets 10 years for VoIP hacking
  5. Google tries to fix Microsoft's Internet Explorer with Chrome Frame
  6. Oracle's "new" kernel for RHEL clone: The real truth
  7. Was Stuxnet built to attack Iran's nuclear program?
  8. 'Preliminary' finding invalidates VoIP patent, says EFF
  9. Comcast hackers get 18 months in prison
  10. Migrating from Exchange 2003 to Exchange 2010

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment