Tuesday, October 19, 2010

Cisco Aims to Change the Game with a Ironport Hosted Email Security Offering

Microsoft's anti-Zeus tool cleans quarter-million PCs | Facebook battles another privacy firestorm

Network World Security

Forward this to a Friend >>>


Cisco Aims to Change the Game with a Ironport Hosted Email Security Offering
Solution includes dedicated hardware in the cloud for anti-spam/virus/malware, DLP, email encryption/tracking/authentication/reporting and a kitchen sink tooCisco jumped into the cloud based hosted email security business with little fanfare about a year ago. Since then it has quietly built out its hosted email security offering to the point where it is now a major player in this space. Sometimes it is better to be late to the game I suppose, it lets you learn from others mistakes. It seems that Cisco Ironport may have done exactly that but I'll let... Read More


WEBCAST: NetApp

Use 50% Less Storage - Guaranteed
Listen to this on-demand Webcast and hear Chris Rima of Tucson Electric Power discuss how his organization managed data growth and improved performance with storage and server virtualization. You'll also hear Brian Garrett from ESG and NetApp experts discuss ways to consolidate your Windows® application data, files, and virtual machines. Learn More

WHITE PAPER: Watchguard

10 questions to ask before you buy an anti‐spam solution
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

Microsoft's anti-Zeus tool cleans quarter-million PCs
Microsoft said its free malware cleaning tool had scrubbed the money-stealing Zeus bot from nearly 275,000 Windows computers in under a week. Read More

Facebook battles another privacy firestorm
Facebook contended that reports that the private data of users has been revealed to third part firms have been 'exaggerated.' Read More

Java exploits have skyrocketed, Microsoft researcher says
The number of attacks on Java in 3Q 2010 dwarfed those made on Adobe PDF An unprecedented wave of attacks that exploit weaknesses in Java has gone largely unnoticed by the security community, said a Microsoft malware researcher in a blog post today. Some 6 million attacks against Java occured in the third quarter of 2010, compared to about a quarter of that amount in the quarter prior. This compares to less than 100,000 attacks in the same period on Adobe PDF documents.... Read More


WHITE PAPER: Tripwire

5 Challenges to Achieve PCI DSS Compliance
Treating PCI as an audit process, scoping it too broadly or not taking advantage of automated tools are all areas that create unnecessary compliance challenges. This white paper tackles the top PCI DSS compliance challenges and offers concrete recommendations on how to put together a PCI DSS compliance plan that works. Read More!

Twitter: Who is reading your DMs? There's an app for that...
Your "private" direct messages can be read by any third party app to which you've given Twitter OAuth permission.Twitter is great way to share information and find likeminded individuals, as well as a great way for mining personal data or social engineering. Like most social media, it can be used for good or for evil and has a plethora of privacy and security issues. Do you remember that DM from six months ago? Well your third party app does. Read More

Cyberattacks now a top threat to UK security, says secretary
Britain's national security faces a serious threat from cyber attacks, according to home secretary Theresa May. Read More

Cisco Announces Changes to CCNP Security
Voted Number 1 Future Technology Area in a Survey of CCIEsCisco announced changes to the CCNP Security certification track today, in addition to the big changes to CCNA and CCNP Voice. (Yes, Cisco is changing the name from CCSP to CCNP Security.) At first glance, the changes almost seem minor - no changes to CCNA Security, still four exams, with names that look like the same topics as the old CCSP. Cisco claims the associated courses have changed quite a... Read More


WHITE PAPER: Sophos

Eight threats your anti-virus won't stop:
This paper outlines eight common threats that traditional anti-virus alone won't stop, and explains how to protect your organization using endpoint security. Read now

Adobe Reader X Adds Security, Productivity, and Mobility
The next major release of Adobe Reader will be available soon. Adobe Reader X will include a variety of new features to make Reader more secure, more functional, and more mobile. Read More

Comcast begins DNS security rollout
Comcast has begun migrating its customers to a new Internet security mechanism that will help protect them from being inadvertently routed to phony Web pages for pharming attacks, identity theft and other scams. Read More

Adobe Patches Security Holes in RoboHelp, InDesign
Adobe released two new security updates today. The patches for Adobe RoboHelp and Adobe InDesign are both rated Important, and Adobe recommends that affected users apply the necessary updates as soon as possible. Read More

Zeus botnet gang targets Charles Schwab accounts
Criminals are now using a Zeus botnet to pillage Charles Schwab investment accounts, a security researcher said. Read More

Security guidelines aimed at zapping power industry cyberattacks, malfunctions
Based on input from the federal government, the North American Electric Reliability Corp., whose mission is to ensure the reliability of the bulk-power system, Thursday sent new security guidelines to about 2,000 electric-power operators to prevent compromise and malfunction of the grid. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

Seven secret weapons for network management on a budget
I am constantly looking for new open source tools that can make my life easier or allow me to assess client network environments. Here are some of my favorites, including a few lesser-known treasures.

The first Windows Phone 7 smartphones
Dell, HTC, LG and Samsung all unveiled smartphones running the Windows Phone 7 OS. In the United States, the GSM phones will be available on AT&T and T-Mobile beginning in November. (CDMA phones, such as the HTC 7 Pro on Sprint, will be available in first half of 2011.) Here's a first look at the new phones. Has Microsoft been successful with its mobile overhaul?

MOST-READ STORIES

  1. The world's coolest data centers
  2. Cisco's top 10 rivals
  3. Cisco/EMC: The rumor that keeps on giving
  4. Ghoulish gadgets: cool Halloween tech
  5. New malware technique targets intrusion-prevention systems
  6. Half of home Wi-Fi networks vulnerable to hacking
  7. A Cisco iPhone app that is worth sharing
  8. Final IPv4 addresses to be issued within months, NRO warns
  9. Kitchen tech: From ingenious to absurd
  10. EMC stock rises on Oracle buyout rumor

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment