Thursday, February 17, 2011

US adopting new cyber attack plan for security warriors

Bruised by Anonymous, HBGary Federal pulls out of RSA | Attack mitigation tools fall short, security vendors say

Network World Security

Forward this to a Friend >>>


US adopting new cyber attack plan for security warriors
Department of Defense lays out plan to link government and private industry security experts Can the US government and private industry unite to fight off those who are intent on waging cyber anarchy? The Defense Department hopes so and it has devised a plan to help promote that cooperation. More on security threats: Stolen US military IDs ideal cover for army of online dating scammers Read More


RESOURCE COMPLIMENTS OF: Citrix XenServer

Download Free XenServer
XenServer is the only enterprise-ready, cloud-proven virtualization platform you don't have to pay for. With live migration, centralized multi-server management, and shared storage support, you can't afford not to try it! Click to continue

WHITE PAPER: PacketMotion

PacketSentry Virtual Segmentation
While firewalls are a widely accepted technology for the Internet perimeter, when deployed internally for PCI scope segmentation they have significant deficiencies. This white paper outlines the issues faced with leveraging firewalls for internal network segmentation, and how PacketSentry bypasses these issues with a unique out of band approach. Read now!

Bruised by Anonymous, HBGary Federal pulls out of RSA
E-mails stolen by hactivist group Anonymous indicate that the security company it targeted was planning to make a "new breed of rootkit" and that it passed along t plan to a technoe company's plan to a technology firm that caters to the federal government. Read More

Attack mitigation tools fall short, security vendors say
Acknowledging that security technologies to prevent cyberattacks are insufficient, several vendors at the RSA Conference urged companies that are making security plans to assume that at some point, they will be breached. Read More

CA cloud service measures security risk, keeps out riff-raff
CA Technologies today announced its cloud-authentication service now features advanced controls to let customers more effectively control who gets into corporate applicaitions. Read More


WHITE PAPER: IBM

The Benefits of Cloud Computing
Although the benefits of cloud computing are clear, so is the need to develop proper security for cloud implementations. The following whitepaper provides an overview of key security issues related to cloud computing, concluding with the IBM Point of View on a secure cloud architecture and environment. Read Now

McAfee, Intel subsidiary Wind River join forces to head off future Stuxnet-like attacks
McAfee, which will soon be an Intel subsidiary, and Wind River, which already is one, Wednesday announced they are hardening the security of industrial commercial operating systems supplied by Wind River to makers of products such as automated teller machines, medical devices, TV set-top boxes and cameras. Read More

Cisco's Security Architecture
SecureX: The Right DirectionI'm at the paranoid geek-fest otherwise known as the RSA Conference. The event kicked off on Monday with a Cisco press conference announcing a new security architecture known as SecureX. SecureX isn't anything brand new, rather it is the consolidation of a number of Cisco products (ASA, TrustSec, IronPort), management tools, and cloud services. What's new here is the architecture. By combining... Read More

Using your Active Directory for VPN authentication on ASA
Using Active Directory as a LDAP server with ASAFor a long time the only way to use Active Directory (AD) for VPN authentication and authorization was to use a RADIUS server such as Cisco ACS that could use AD as an external database. With the addition of LDAP support on ASA, this changed and it was possible to authenticate directly to AD. Configuring this is sometimes cumbersome. In this two part series, I will discuss LDAP configuration on ASA... Read More


WHITE PAPER: Tripwire

Narrow the Breach-to-Detection Gap for Better Security
What's more important, security or compliance? Most IT shops are focused on compliance but breaches are still happening. A recent study by Verizon Business concludes that evidence of those breaches tends to be right there in log files. Read More Now.

Juniper aims to ease and speed configuration of virtual gateways
Juniper Networks is introducing a virtual security gateway that integrates with its physical security gateway so customers need not configure their security zones twice when working in a mixed physical-virtual environment. Read More

Microsoft has a change of heart on how to keep Internet safe
Should ISPs be the ones who keep hacked PCs off the Internet? Microsoft's chief security executive used to think so, but now he's had a change of heart. Read More

Four skills CISOs need now
Leading a security program within an organization has taken on a new shape, says career expert Lee J. Kushner. What skills do security professionals need to hone now in order to be competitive in the job market? Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

15 more useful Cisco sites
Three years ago, we compiled our initial list of 20 useful sites for Cisco practitioners, partisans and pundits. Now we're adding to that list with 15 more sites we found useful for the Cisco masses.

A sneak-peek preview of Android 3.0
Expect a new holographic look, customizable home screens, a Windows-style taskbar, and tabbed browsing in Google's upcoming version of the Android OS, code-named Honeycomb.

MOST-READ STORIES

  1. Geekiest marriage proposals of all time
  2. Top 12 Google Labs experiments
  3. Juniper up next with cloud switches
  4. Why Watson bet odd amounts on Daily Doubles
  5. Hacked and now vandalized, HBGary pulls out of RSA
  6. Tablets, smartphones force Cisco to rethink how security works
  7. Banshee Amazon Store disabled in Ubuntu 11.04 by Canonical
  8. My, that's a big iPhone 5 screen you have
  9. Microsoft certifications won't boost your pay much
  10. Microsoft has a change of heart on how to keep Internet safe

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment