Search This Blog

Friday, September 24, 2010

US backs 10 Smart Grid projects with $34M to bulk up cybersecurity

Privacy Choices: Who's Watching You and Tracking Your Clicks? | U.S. military takes cloud computing to Afghanistan

Network World Security

Forward this to a Friend >>>


US backs 10 Smart Grid projects with $34M to bulk up cybersecurity
Department of Energy gets behind cybersecurity projects to protect national electric gridThe US Department of Energy today spent $30.4 million on cybersecurity projects it says will go a long way towards addressing the nation's electric grid cybersecurity issues. Read More


RESOURCE COMPLIMENTS OF: Websense

Join SpeakUp – A Web Security Discussion
SpeakUp is a new interactive Security forum with expert opinion and absolutely no product pitches - it's a terrific way to connect with your peers and discover how the latest trends and technologies are affecting your security. This professionally hosted forum allows you to voice your opinion, get answers and influence the debate. Visit www.websense.com/speakup to register today!

WHITE PAPER: BMC

Looking Ahead: A Cloud Report from 2015
Learn why BMC Software's chief information officer foresees a future in which organizations realize how secure the public cloud is, underutilization of hardware is a thing of the past and daily business operations are more productive. Read More

Privacy Choices: Who's Watching You and Tracking Your Clicks?
Every click you make is tracking your online behavior, but PrivacyChoice provides privacy tools to help you control who's watching and tracking you.Every click you make is tracked by ad companies who tend to collect information on your behavior and then sell it to other advertisers who want you to be their target too. Maintaining online privacy can be difficult and time-consuming, but excellent privacy tools provide hope and control. Read More

U.S. military takes cloud computing to Afghanistan
The U.S. military is taking cloud computing into rugged terrain in Afghanistan, where the basic hardware and software technology is being packed into mobile boxes to aid warfighters in the sky and on the ground. Read More

A Browser Cookie That Won't Go Away?
"Evercookie" is the browser cookie that just won't go away. If you're concerned about having your Web browsing history tracked, you, like most people, will probably delete your cookies and clear your browsers' caches. However, evercookie, written in JavaScript, produces "extremely persistent cookies" that can identify a client even after you've removed standard or Flash cookies. Read More


WHITE PAPER: Fluke Networks

Field Testing Installed Optical Fiber Cabling
As traffic over networks expands and expectations of reliability increase, testing optical fiber cabling after installation is more important than ever before to assure the end-user that the installation was done properly and that the cabling will support Local Area Networks (LAN) into the future. Read now!

Five federal agencies want big robot technology advances
Five federal agencies this week teamed to announce they are looking to fund innovative research and development of robotic technologies for everything from home healthcare and bomb detecti Read More

Hackers exploit latest Microsoft zero-day bug
Microsoft is warning users that hackers are exploiting the unpatched bug in ASP.Net to hijack encrypted Web sessions. Read More

8 essential privacy extensions for Firefox
They say privacy doesn't exist on the Web -- but that doesn't mean you can't try to safeguard your personal information. Our computers are loaded with details about our personal and business lives, and it's definitely not acceptable to reveal them haphazardly. With hackers becoming ever more sophisticated, you have to take precautions. Read More


WEBCAST: Symantec

Is Your Business Fully Protected?
Your small business may be at risk. A recent study revealed cybercriminals are now targeting smaller businesses1 and as security threats are becoming more complex, antivirus alone can no longer deliver adequate protection for your critical business assets. Learn More Now.

Mobile workers pose biggest security risk
Mobile workers trigger more security alerts when they leave the office than when they do at their desks, the latest Symantec MessageLabs Intelligence Report has suggested. Read More

A laundry list of power industry incidents to learn from
In this seventh article in a series focusing on the need for improved information assurance and cyber situational awareness in the electric power industry, we continue a survey of government and industry consensus about the need for increased security of SCADA systems in the power industry. Read More

Outsourced apps a security minefield, study finds
Outsourced software is a hotspot for the sort of hidden security problems that leave applications vulnerable, an analysis by code testing outfit Veracode has warned. Read More

Maine court limits damage claims in data breach cases
Maine's Supreme Court has ruled that consumers affected by the data breach at supermarket chain Hannaford Bros. in 2008 cannot claim damages unless they suffered uncompensated financial losses or some other tangible injury. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

5 Strange Ways iPhones Die: Insurer Hears it All
What do toilets, beer and elevators have in common? They all send many iPhones to their death, says consumer electronics insurer Worth Ave. Group, which shared some unfortunate tales of iPhone disaster.

Ultimate guide to the flat data center network
The traditional three-tier network had a good run, but its age is starting to show in today's brave new world of server consolidation, virtual machines, cloud computing and 10Gigabit switches. Here's a look at where we've been and where we might be headed.

MOST-READ STORIES

  1. Windows 7 'halo' effect boosts customer satisfaction scores
  2. Businesses gobbling up Google Android smartphones
  3. Was Stuxnet built to attack Iran's nuclear program?
  4. Oracle's "new" kernel for RHEL clone: The real truth
  5. How much should you spend on IT security?
  6. Microsoft HPC claim: Windows is cheaper than Linux
  7. Cisco updates small-business switches, phones, cameras
  8. Can behavioral biometrics help detect terrorists entering the U.S.?
  9. How to hack IP voice and video in real-time
  10. AT&T on loss of iPhone exclusivity: What, me worry?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: