Monday, October 18, 2010

Mixed success in the fight against cybercrime

RSA: Security requirements must be defined when outsourcing | Chinese anti-satellite space junk count hits 3,000

Network World Security

Forward this to a Friend >>>


Mixed success in the fight against cybercrime
RSA Europe 2010: Botnets beaten, but threats remain highCovering RSA in San Francisco last March required only a brief BART commute. With this week's RSA Europe 2010 requiring a transatlantic flight, I'm covering the security show in London from the security of my home in California. At RSA Europe some notable successes fighting cybercrime were heralded but the threat remains as does the need to stay on guard. Read More


WEBCAST: Bradford Networks

Step-by-Step Process to Network Security
Hear from one financial services IT pro who thought his network was completely secure until it failed an internal security audit. Tim Childress from the credit card division of Bridgestone discusses the unique approach he took to improve network security. Hear how he met his objectives to stop rogue devices, gain better network visibility. View now

WHITE PAPER: HP

Framework for Securing Virtualized Data Centers
Most companies still have no clear and definite security policy for their virtual environments. Learn the need for security solutions that can address the reality of expanding virtualization. Read Now

RSA: Security requirements must be defined when outsourcing
One of the common pitfalls of outsourcing software development is not clearly defining and communicating the business's security requirements to the supplier, a panel of security experts have warned. Read More

Chinese anti-satellite space junk count hits 3,000
NASA says space debris from the Chinese the Fengyun-1C spacecraft anti-satellite test poses distict hazards to other satellitesThree years after the Chinese government blew one of its satellites in space with a missile the debris from that explosion continues to grow.  Read More


WHITE PAPER: Oracle

Best Practices for a Data Warehouse on Oracle Database 11g
Increasingly companies are recognizing the value of an enterprise data warehouse (EDW). A true EDW provides a single 360-degree view of the business and a powerful platform for a wide spectrum of business intelligence tasks ranging from predictive analysis to near real-time strategic and tactical decision support throughout the organization. Learn more

Half of home Wi-Fi networks vulnerable to hacking
Nearly half of all home Wi-Fi networks could be hacked within five seconds, says CPP. Read More

NASA, Harvard beam up virtual software lab
NASA furthers crowdsourcing software development techniques NASA has teamed with Harvard University to set up a virtual lab where software programmers can compete with each other to create NASA system applications. On tails, green peas and breaking waves: What's hot in space? Read More


WHITE PAPER: Iron Mountain

Is Online Server Backup Appropriate for Your Business?
Read this white paper to examine the setbacks of traditional backup, gain a better understanding of online backup, and discover why Iron Mountain's LiveVault solution for automated server backup and recovery won the 2006 award for Best Storage Software Solution from the Software and Information Industry Association. Read now.

Introducing the FBI's Zeus Trojan crime ring most wanted poster
FBI tackles huge cyber crime investigation Ah their parents must be proud. In one of the largest cyber criminal cases the FBI has ever investigated, the crime fighting agency today released a package of information about the bust this week of an alleged group of criminals that targeted the accounts of medium-sized companies, towns, and even churches. Before they were caught, members of the theft ring managed to steal $70 million, the FBI stated.... Read More

AVG Internet Security 2011
AVG Internet Security 2011, which shipped on Tuesday, offers the full complement of tools you'd expect in an all-in-one security suite, packaged in a simple-to-use interface and offering integration with popular browsers and Outlook. But the software is marred by annoying attempts to upsell you to other products, and a scanning engine that may slow down your system. Read More

McAfee bolsters endpoint security, mgmt software
McAfee endpoint security supports Windows and Apple Macintosh as well as Android-based handhelds and the iPhone, Symbian and Windows Mobile smartphones. Read More

As plans for NAC deployment get under way, keep it simple
I've mentioned network access control several times in this column over the past few months. If you've been following along, you know that I like the functionality it offers but am leery of the difficulty and cost of deploying it, as well as the resources required to manage it properly. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

Seven secret weapons for network management on a budget
I am constantly looking for new open source tools that can make my life easier or allow me to assess client network environments. Here are some of my favorites, including a few lesser-known treasures.

The first Windows Phone 7 smartphones
Dell, HTC, LG and Samsung all unveiled smartphones running the Windows Phone 7 OS. In the United States, the GSM phones will be available on AT&T and T-Mobile beginning in November. (CDMA phones, such as the HTC 7 Pro on Sprint, will be available in first half of 2011.) Here's a first look at the new phones. Has Microsoft been successful with its mobile overhaul?

MOST-READ STORIES

  1. Cisco's top 10 rivals
  2. Tech hiring up almost 50% since 2009, Dice says
  3. Gang uses Facebook to rob houses
  4. Kitchen tech: From ingenious to absurd
  5. IMDb turning 20 on Sunday
  6. Human error gave spammers keys to Microsoft systems
  7. What will Android 3.0 look like?
  8. All hail the open-source time machine!
  9. Microsoft Wiffler lets smartphones use free Wi-Fi from moving vehicles
  10. Cloud computing security skeptics abound

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment