Wednesday, January 26, 2011

Low-cost SSL proxy could bring cheaper, faster security; defeat threats like Firesheep

Google wants to hire more than 6,000 workers in 2011 | 5 tips for Facebook from security and privacy experts

Network World Security

Forward this to a Friend >>>


Low-cost SSL proxy could bring cheaper, faster security; defeat threats like Firesheep
Researchers have found a cheaper, faster way to process SSL/TLS with off-the-shelf hardware, a development that could let more Web sites shut down cyber threats posed by the likes of the Firesheep hijacking tool. Read More


WHITE PAPER: Tripwire

Narrow the Breach-to-Detection Gap for Better Security
What's more important, security or compliance? Most IT shops are focused on compliance but breaches are still happening. A recent study by Verizon Business concludes that evidence of those breaches tends to be right there in log files. Read More Now.

WHITE PAPER: Quantum Corporation

Securing Data Stored On Tape With Encryption
With companies storing data for longer periods of time to meet compliance regulations and business best practices, the inherent risk of a data breach is growing significantly. Read Now

Google wants to hire more than 6,000 workers in 2011
Google looking to hire all manner of employees for Chrome to Web developmentGoogle seems poised to hire more than 6,000 people this year all goes according to plan.  That amazing fact was posted on the company's website by Alan Eustace, Google's senior vice president of engineering and research.  Read More

5 tips for Facebook from security and privacy experts
'Get the dislike button!' 'OMG this girl KILLED herself after her dad posted on her wall!' What do these comments have in common? They are two of the scams we see making the rounds on Facebook in an attempt to get you to click on and install a bad application. The Facebook con popping up everywhere this week is the 'total profile views' ruse. It's another version of the 'See who viewed your profile' trick that makes its way around the social network and plays to the user's ego and desire for information about who is checking out their Facebook page. Read More


WEBCAST: F5 Networks

BIG-IP GTM v10.1 DNSSEC In Five Easy Steps
In this Video Webinar, Peter Silva talks with F5's Sr. Field Systems Engineer, Michael Falkenrath about the new BIG-IP GTM v10.1 DNSSEC feature. They take us through the basics of DNSSEC and GTM's ability to sign DNS requests on the fly. Watch how GTM is the industry's first and the only solution to secure your DNS infrastructure. View now!

US Secret Service taps video game, 3D technology for advanced security training
US Secret Service goes virtual to gain security insightsWhen it comes to preparing for all manner of security threats, the more realistic the training can be the better. That's why the US Secret Service said it has developed a software system that uses gaming technology and 3D modeling to offer high-tech training for its personnel. Read More

FCC sets LTE as standard for public safety network
The FCC sets LTE as the standard for a nationwide mobile broadband network for public safety agencies. Read More


WHITE PAPER: Symantec

Next Generation Data Protection
These next generation tools, such as disk based backups, deduplication, virtualization, archiving, and continuous data protection, are essentially revolutionizing the world of data protection. download this whitepaper to find the newest approach to unified data protection. Read now!

Forrester's 2011 security strategy recommendations
Every New Year brings an opportunity to review existing security plans and adjust strategies for the next year. And, as I participate in these conversations for 2011, a lot of similar themes have popped up. Most CISOs are struggling with the same issues, ranging from dealing with the changing threat landscape to properly supporting the rising adoption of social technologies, employee-owned mobile devices, and cloud services. In fact, Forrester's research shows that a majority of challenges for security professionals all relate to business orientation and alignment. For example, many senior business and IT leaders are asking CISOs to better support and align with the business and IT objectives, requesting regular interactions and updates from security teams. Read More

Business continuity planning still not widely implemented
The decades following the advent of personal computing fostered the inevitable march of information from centrally stored and professionally managed safe houses consisting of mainframe and minicomputer clusters to the ad hoc world of impulsively managed devices such as microcomputers, tablet computers and smartphones Read More

Do you know who's tracking you on the Web?
Imagine a creepy guy wearing a ski mask and a trenchcoat, following you around and scribbling down every place you visit, every item you peruse, and every action you take. Now and again, he races in front of you, opens the trenchcoat, and flashes an ad based on something you just checked out. Read More

Identity and Networking
Real progress and integration in 2011For the past 15 years or so, the networking industry has been hinting at a vision with a snappy title like "identity-driven networking." I first heard this concept in the late 1990s, when Cisco came up with its own spin on this theme with an initiative called Directory Enabled Networking (DEN). The thought was that the network would query the network to enforce some kind of access control policies... Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Top 10 Web hacking techniques of 2010 revealed
  2. Jack Bauer culture: Torture by 'patriots' for national security
  3. Two-thirds of U.S. Internet users lack fast broadband
  4. Cisco, Verizon enlist in 24-hour IPv6 trial
  5. Fedora 15 changes network device naming
  6. Forrester: Oracle confining Java future to enterprise use
  7. Gartner slams Cisco's single-vendor network vision
  8. Cisco: Puppy cams threaten Internet
  9. Red Hat builds gutsy, green virtualization machine
  10. New CIO cleans up outsourced IT at Clorox

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment