Search This Blog

Wednesday, November 03, 2010

Researchers tout unique automated firewall fault fixer

Father of Firesheep fires away after wild week in WiFi security | Google Pays Cash to Hackers for Web App Security Flaws

Network World Security

Forward this to a Friend >>>


Researchers tout unique automated firewall fault fixer
Automated policy tool can ease admin burden of managing firewallsResearchers will next will detail a tool they say will automate changes and significantly reduce the administrative upkeep of firewalls. Read More


WHITE PAPER: HP

How Device Reputation Works
From botnet CnC servers to malware depots and phishing sites, cyber threats are growing by the day and with little risk of being caught or prosecuted, they will likely continue to rise. This paper explains how device reputation works and demonstrates the powerful role it can play in preventing attacks. Read now.

WHITE PAPER: HP

Framework for Securing Virtualized Data Centers
Does the broad adoption of virtualization make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments. Understand the real need for virtualized security solutions. Read Now

Father of Firesheep fires away after wild week in WiFi security
Firesheep, the Mozilla Firefox add-on released about a week ago that lets you spot users on open networks visiting unsecured websites, has given creator Eric Butler more than his 15 minutes of fame. Read More

Google Pays Cash to Hackers for Web App Security Flaws
Wanted by Google: Bounty-hunting hackers who can find security vulnerabilities in popular Web apps. Read More

Sony BMG rootkit scandal: 5 years later
The revelation 5 years ago that Sony BMG was planting a secret rootkit onto its music customers' Windows PCs in the name of anti-piracy is seen now as one of the all-time significant events in IT security history. Read More


WHITE PAPER: Symantec

Don't Leave Your Business at Risk- Protect it Completely
The time is right for a clear assessment of your risks, and a realistic plan to address them—for your customers, your reputation, and your business future. Discover best practices for protecting your business data and the solutions available to start now by reading this guide. Read Now.

The New CISO: How the role has changed in 5 years
The role of CISO has evolved in the last five years from one of IT security administration to high-level risk management. Here are four perspectives on how and why it happened and how you can go about doing the job effectively today. Read More

Security laws, regulations and guidelines directory
This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. Each entry includes a link to the full text of the law or reg as well as information about what and who is covered. Read More

Street View goes live in Germany with blurred images
Google gingerly launched a select set of Street View images for Germany on Tuesday, a country where it has faced some of the most fierce opposition to the imagery application. Read More


WHITE PAPER: Sophos

Protecting personally identifiable information
Virtually every organization acquires, uses and stores personally identifiable information .This white paper examines the challenges organizations face and the steps they can take to protect themselves and their customers against data breaches and ensure the safety of this sensitive information. Read Now

Antivirus software didn't help in zero-day malware attack on power plant
When the zero-day attack known as the "Here You Have" virus hit about  500 PCs at the Salt River Project, a large public power utility and water supplier for Arizona, it turned out that the antivirus software in use provided no defense. Read More

ICO won't rush to respond over Google Wi-Fi debacle
The Information Commissioner's Office (ICO) has revealed won't be "panicked into a knee jerk response" regarding the Google Street View debacle. Read More

Sophos delights Mac users with free antivirus
Security software company Sophos has finally broken ranks and decided to offer Mac users a free antivirus product without hidden strings. Read More

Avoid Security Software Overlap
Reader LK wants to know if Microsoft Security Essentials (which I've championed in these pages many times) can be installed alongside other anti-virus and/or anti-malware programs. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

The Google Android Quiz
Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies
Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.

MOST-READ STORIES

  1. Sony BMG rootkit scandal: 5 years later
  2. Apple iPhone bug causes Europe to wake up late
  3. Is it legal to use Firesheep at Starbucks?
  4. The 25 worst high-tech habits (and how to fix them)
  5. Google's top 10 best (and worst) innovations of the year
  6. Steve Jobs' business card from 1979
  7. 8 cool features of Chrome 8 beta
  8. Air Force bounces Windows XP, goes all-in for Windows 7
  9. TSA: Show us your body or we'll feel you up
  10. Microsoft lures developers with Windows Azure

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: