Thursday, February 03, 2011

Can you guarantee secure remote access from devices in the wild?

Waledac botnet poised for a rebound with stolen credentials | It's Time To Re-Examine Endpoint Security

Network World Security

Forward this to a Friend >>>


Can you guarantee secure remote access from devices in the wild?
In the course of scores of conversations about security, I have regularly elicited a gobsmacked silence with a simple question: "How do you reliably secure access from an untrusted computer?" Read More


RESOURCE COMPLIMENTS OF: St. Bernard, now doing business as EdgeWave

More Power, Lower Price, Earn $15 GC
iPrism Web Security's 500h appliance delivers 1Gbps of throughput for unrivalled speed and performance across your enterprise. We've got the power to handle your biggest pipeline. We'll try to match the cost of your current solution, or any competitive offer you have. You'll earn cash just for checking us out. Click here for the EdgeWave Bid Desk.

WEBCAST: F5 Networks

Secure DNS with BIG-IP v10.1 DNSSEC
Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn't working, then your business likely isn't either. Secure your business and web presence with Domain Name System Security Extensions (DNSSEC) on F5 BIG-IP v10.1 Learn more now!

Waledac botnet poised for a rebound with stolen credentials
The Waledac botnet, crippled by legal action from Microsoft and covert infiltration by security researchers just a year ago, appears poised for a big comeback. Read More

It's Time To Re-Examine Endpoint Security
Commodity viewpoint is erroneous -- and dangerousBack in 2007, ESG Research asked 206 IT security professionals to respond to the following statement: "Desktop security has become a commodity market with little difference between products." As expected, 58% of respondents either strongly agreed (17%) or agreed (41%) with this statement. In other words, it really didn't matter whether your ran Internet security tools from Kaspersky, McAfee, Microsoft,... Read More


WEBCAST: Websense, Inc.

Web Security Gateway Solutions Demo
This demo provides a hands on view of Websense Web Security Gateway solutions and how they enable safe productive use of today's dynamic, interactive Web. Learn More Now!

NIST puts one more nail in the Mercury thermometer coffin
Mercury still found in many industrial applications but alternatives to the poisonous product existThe venerable Mercury thermometer has been on its way out for a number of years and the National Institute of Standards and Technology next month may give it a final push. Read More

Cloud services could bolster national cyber security
The shift to cloud computing offers an opportunity to better secure the national digital infrastructure by concentrating the burden of cyber security among a relatively small number of service providers rather than thousands of individual businesses, according to a report by a foreign policy think tank. Read More


WHITE PAPER: Riverbed

Application-Aware Network Performance Management
Riverbed® Cascade© stacks up extremely well against the competition. How well? In particular, Cascade outperforms other application-aware network performance management solutions in such important areas as product strength and cost efficiency. Read Now.

Is spying on teenage drivers an invasion of privacy or a parent's right?
DriveCam executive defends American Family Insurance's Teen Driver surveillance technology and answers critics charges that captured footage violates privacy.Teenage drivers crash nine times more often than adults. Teens drive more safely when parents are riding in the car with them, but parents can't always ride with them. So some turn to technology to capture audio and video of teenage drivers in an effort to make them feel watched, as if their parents were there. Read More

Appliance bolsters corporate web access, e-mail security
Websense today unveiled three new gateway security products for e-mail, Web and data-loss prevention that combines an on-premises appliance with secure content filtering in the cloud. Read More

The politics of cyberspace
Using Computer-Aided Thematic Analysis (CATA), I organized over 300 transcripts, interview and lecture podcasts and video clips into groups for each of the weeks in the course. Read More

Danger, Danger: The Cloud Will Eat Your Data
People place too much confidence in "the cloud". Newsflash: Placing your mission-critical data in "the cloud" may be hazardous to your health. You are at an increased risk if you are elderly, pregnant, or wish to keep your IT job. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

15 more useful Cisco sites
Three years ago, we compiled our initial list of 20 useful sites for Cisco practitioners, partisans and pundits. Now we're adding to that list with 15 more sites we found useful for the Cisco masses.

A sneak-peek preview of Android 3.0
Expect a new holographic look, customizable home screens, a Windows-style taskbar, and tabbed browsing in Google's upcoming version of the Android OS, code-named Honeycomb.

MOST-READ STORIES

  1. No more IPv4 addresses
  2. Android topples Symbian as world's No.1 mobile OS
  3. Internet 'kill switch' bill reintroduced as Egypt remains dark
  4. How to protect Windows from the new MHTML zero-day hole
  5. As IPv4 disappears, transition poses hazards
  6. Microsoft warns of new Windows zero-day bug
  7. Anatomy of an Internet blackout
  8. Kaspersky vows anti-virus products are safe despite source-code theft
  9. IPv4 addresses: Going, going, g...
  10. What is an 'Advanced Persistent Threat,' anyway?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment