Thursday, October 21, 2010

IBM uses 'virtual doorman' to lock down cloud computing

HP opens attack on Cisco certifications | Users neglect Java patches, leave attack door wide open

Network World Security

Forward this to a Friend >>>


IBM uses 'virtual doorman' to lock down cloud computing
IBM has developed a new rootkit-detection system designed to make it easier to detect malicious attacks on virtualized data centers. Read More


WEBCAST: NetApp

Is Your IT Ready For The Future?
Join us for a virtual event to learn about new NetApp technologies, products, and solutions that can make your IT ready for the future. With a shared infrastructure built on NetApp, IT can deliver unparalleled efficiency and flexibility to your organization. Learn More

WHITE PAPER: ForeScout

Choosing a Network Access Control System
This paper describes different types of network access control (NAC) systems and provides guidance as to which type would be best suited for your network. Learn More.

HP opens attack on Cisco certifications
HP this week unveiled a training and certification program for IT personnel converging enterprise infrastructure and rearchitecting data centers. Read More

Users neglect Java patches, leave attack door wide open
Oracle should piggyback on Microsoft's update service to boost users' chances of running a patched version of Java, a security expert said. Read More

Astronomers spot most distant galaxy in space (so far!)
At 13.1 billion light years away, galaxy hold's clues to Big Bang theoryAstronomers say they have spotted the faint glow of a galaxy 13.1 billion light years from our own, making it the most remote system ever studied. Read More


WHITE PAPER: NetApp

Top Considerations for Virtualizing Microsoft Applications
This report describes the reasons for virtualizing Microsoft® applications. It highlights the most important architecture and deployment considerations to help you get started. Read Now.

Data loss incidents on the decline
Microsoft reports fewer losses, but cites recession as the causeA big focus of the Microsoft Security Intelligence Report (MSIR), volume 9, released this week, was on botnets and the company's reported success at battling them, but I found other interesting tidbits there, too. For instance, Microsoft reports a steady decline over the last two years in the number of data loss incidents made public around the world and cites the recession as the possible reason.... Read More

The Link Between Recent Privacy 'Breaches'
Facebook has been the subject of intense scrutiny over privacy concerns...again. Or, is it still? Facebook is not alone, however, as Twitter and Android have also been recent targets of privacy ire. Each of these privacy incidents has something else in common as well--they are a result of relationships with third-parties that users have approved. Read More

Limitations of software-as-a-service highlighted at Gartner ITxpo
ORLANDOD -- Software-as-a-service (SaaS) may offer the advantage of application-based computing you can pay for as needed, but there are pitfalls, too, that are becoming increasingly evident, according to Gartner analyst Robert DeSisto. Read More


WHITE PAPER: McAfee

Deploying Application-enabled Smart Phones in the Enterprise
majority of enterprises will soon diversify their end user offerings in smart phone devices, including enabling user-liable devices to connect to their systems. Read now!

Apps Going Viral: When Your Smartphone Gets Hacked
How secure is banking on your iPhone? How sure are you that those app developers have plugged those security holes? So far, there isn't much malicious code out there targeted at smartphones, but that soon may change as smartphone sales surpass those of laptop and desktop machines. Read More

E-crime Now More Common Than Real Crime
If there was any doubt about the popularity of electronic dupery, it should be put to rest with a report on global fraud released the week by the risk management consulting firm Kroll. For the first time since 2007, when the company began putting together its annual survey on crime, electronic fraud surpassed physical scams as the most common form of fraud in the world. Read More

Congress to Facebook Over Privacy Row: We Want Answers
Facebook's latest privacy gaffe has caught the attention of Congressmen Edward Markey (D., Mass.) and Joe Barton (R., Texas) leaders of the House Bi-Partisan Privacy Caucus. The two Congressmen have asked Facebook to answer questions regarding a privacy breach unearthed by a report in The Wall Street Journal on Monday. The Journal said that third-party Facebook applications, such as Farmville, were transmitting Facebook user IDs (UID) to advertising and Internet tracking firms. Read More

Adobe: Hacker 'spotlight' will shine on Reader X's sandbox
Adobe's chief security executive said that the bull's-eye will be on the back of Reader X when the new version ships next month. Read More

Security vendor: Firewalls defenceless against new attack
Why are apparently well-defended networks belonging to the government, military and monied corporates falling to large-scale targeted attacks so regularly? Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

The world's coolest data centers
Data centers need to be secure, temperature controlled, spacious, redundant, reliable – nothing sexy. But that doesn't mean they can't be. Here are a few that rise above the crowd and take advantage of the possibilities.

10 spooky Halloween iPhone apps
iPhone app developers have been working overtime this year to help you transform your favorite device into a high-tech scarephone. Have they succeeded? We'll let you be the judge of these 10 spoooooooky iPhone apps.

MOST-READ STORIES

  1. Privacy? Run a background check on yourself
  2. Twitter: Who is reading your DMs? There's an app for that ...
  3. HP opens attack on Cisco certifications
  4. Gaping holes remain in U.S. cybersecurity plan
  5. 72% of parents monitor their kid's Facebook page
  6. Comcast begins DNS security rollout
  7. Cisco announces changes to CCNP security
  8. Microsoft takes aim at Google Apps with Office 365
  9. Joyent adds Windows, Linux support
  10. Final IPv4 addresses to be issued within months, NRO warns

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment