Search This Blog

Friday, November 05, 2010

How CISO role has changed in 5 years; Antivirus software fails power plant

Antivirus software didn't help in zero-day malware attack on power plant | Father of Firesheep fires away after wild week in WiFi security

Network World Compliance

Forward this to a Friend >>>


The New CISO: How the role has changed in 5 years
The role of CISO has evolved in the last five years from one of IT security administration to high-level risk management. Here are four perspectives on how and why it happened and how you can go about doing the job effectively today. Read More


RESOURCE COMPLIMENTS OF: IT Roadmap 2011

IT Roadmap is all new for 2011!
Maximize your learning in one day: IT Roadmap visits 7 cities in 2011 with a more streamlined agenda; more high-priority IT topics and trends; top industry analysts; experienced end users and leading technology providers. It's one day packed with everything you need to know to make the best IT decisions for your enterprise for the year ahead. Visit the new ITR website

WHITE PAPER: Fluke Networks

Top 10 Problems Network Techs Encounter
In this environment, network technicians are required to do more than simply add new machines to the network. Often they are called on to troubleshoot more complex issues, thus keeping the network up and running at top speed. Read now!

Antivirus software didn't help in zero-day malware attack on power plant
When the zero-day attack known as the "Here You Have" virus hit about 500 PCs at the Salt River Project, a large public power utility and water supplier for Arizona, it turned out that the antivirus software in use provided no defense. Read More

Father of Firesheep fires away after wild week in WiFi security
Firesheep, the Mozilla Firefox add-on released about a week ago that lets you spot users on open networks visiting unsecured websites, has given creator Eric Butler more than his 15 minutes of fame. Read More

Microsoft: Cloud services hampered by unclear data rules
The patchwork of rules across Europe regarding the handling of data poses a hurdle for Microsoft's efforts to provide cloud-based services, a senior Microsoft attorney said on Thursday. Read More

Sony BMG rootkit scandal: 5 years later
The revelation 5 years ago that Sony BMG was planting a secret rootkit onto its music customers' Windows PCs in the name of anti-piracy is seen now as one of the all-time significant events in IT security history. Read More

Lock Down Your Android Devices
Two years ago almost nobody had heard of Android. Now it's nearly ubiquitous among smartphone users, and it's on track to become the most popular mobile operating system in the United States. When it comes to business use, though, Android still has some growing to do. Here's how to keep your Android phones and tablets safe from malware and hackers. Read More


WHITE PAPER: IBM

Extending the Value of Unified Communications
Read this paper to see how IBM® Lotus® Sametime® Unified Telephony software can give your business a competitive edge by extracting more value from your existing investments in telecommunications. Read More Now

Facebook and Twitter Flunk Security Report Card
Ignorance is bliss, so don't read any further if you don't want to panic about Facebook and Twitter security. Read More

Financial services firms expand online fraud defense
As guardians of wealth, financial-services firms have always been a high-value target for cybercrime, and with online banking and trading, banks find they have to work harder than ever to safeguard their operations. Read More

A security analysis of Don't ask, don't tell: Prescription for blackmail
Many readers are no doubt aware of the recent back-and-forth legal decisions affecting the rights of lesbian, gay, bisexual and transgender (LGBT) military personnel in the U.S. armed forces. Although I am proud to be actively committed to LGBT equality in every aspect of life I don't want to talk about politics in today's column: I want to talk about the security implications of what I consider to be one of the stupidest personnel policies on the planet. Read More

Tokenization: Five Things CIOs Need To Know
Data breaches are expensive-they cost an average of $6.75 million per incident, according to one study. One way to reduce the risk is to cut down on the places that handle sensitive data. Enter tokenization. Read More


WHITE PAPER: Emerson Network Power

Improving Availability in a Digital Hospital
Downtime is not an option for healthcare IT systems. To ensure patient data is always available at the point of care, the hospital's network closet IT infrastructure must be properly designed. Learn the essential points for evaluating the benefits and costs associated with powering and cooling a hospital's network closets. Read Now

What You Need to Know About New IE Zero-Day
Internet Explorer is under attack again. Microsoft has issued a security advisory explaining a newly-discovered exploit impacting most versions of the Internet Explorer Web browser. The security advisory contains details about the threat, as well as some guidance to protect vulnerable browsers pending a patch from Microsoft to fix the hole. Read More

Sophos delights Mac users with free antivirus
Security software company Sophos has finally broken ranks and decided to offer Mac users a free antivirus product without hidden strings. Read More

Security laws, regulations and guidelines directory
This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. Each entry includes a link to the full text of the law or reg as well as information about what and who is covered. Read More

Fortinet's threat report highlights Zeus, money mule risks
Internet users can expect to encounter more Zeus activities and money mules, according to Fortinet's October 2010 Threat Landscape report. Read More

Antivirus scanning becoming inadequate, says Webroot CEO
US antivirus vendor Webroot has bought UK-based Prevx in an acquisition that looks like the latest symptom of the growing dissatisfaction among security companies with the current signature-based scanning model for detecting malware. Read More

Attack Ads--Not Just for Politicians
High-tech companies have shown that they're not above slinging a mud pie or two at their competitors Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

The Google Android Quiz
Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies
Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.

MOST-READ STORIES

  1. Microsoft warns of new Zero-day attack affecting IE 6,7,8
  2. Cisco rolls out social network monitoring software
  3. NASA takes cloud computing to Mars
  4. GPL conflicts with Apple's iTunes, don't ask, don't tell
  5. Father of Firesheep fires away after wild week in Wi-Fi security
  6. The 25 worst high-tech habits (and how to fix them)
  7. T-Mobile ad mocks iPhone 4 and AT&T
  8. Lock down your Android devices
  9. Complexity of IT systems will be our undoing
  10. Russian-Armenian botnet suspect raked in €100,000 a month

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: