Tuesday, May 24, 2011

U.S. international cyberspace policy sounds good; will be hard to implement

Siemens' 'damage control' response to SCADA bug frustrates researcher | Apple of my eye? US fancies a huge metaphor repository

Network World Security

Forward this to a Friend >>>


U.S. international cyberspace policy sounds good; will be hard to implement
The ambitious new U.S. strategy for securing the Internet sets critical goals that may be hard to put into practice, experts say, because some of them conflict and pose seemingly insurmountable technical problems. Read More


WHITE PAPER: Dell

The Business Case for Security Information Management
It is a mistake to assume that information security is solely a technical problem left for IT to solve. This guide is a non-technical discussion of security information management. Learn more.

WHITE PAPER: Quest Software

Controlling and Managing Super User Access
Effectively managing privileged – aka "super user" – accounts is vital for addressing your company's security concerns. In this Quest white paper, see why native tools are limited when managing these accounts. Read now!

Siemens' 'damage control' response to SCADA bug frustrates researcher
Siemens said it intends to fix a vulnerability discovered in its industrial control system products, but the NSS Labs researcher who found the bug says the company seems to be downplaying the seriousness of the problem to save face. Read More

Apple of my eye? US fancies a huge metaphor repository
Researchers with the US Intelligence Advanced Research Projects Activity want to build a repository of metaphors. You read that right.  Not just American/English metaphors mind you but those of Iranian Farsi, Mexican Spanish and Russian speakers. Read More

7 questions about the Mac malware scare
A few answers help clarify what the MacDefender scareware plague really means for Mac users and administrators Read More


WHITE PAPER: HP & Intel

RAS features: Mission-Critical Converged Infrastructure
HP Integrity Servers have been leaders in the industry for providing mission-critical RAS since their inception. This latest generation of Integrity, based on HP's Converged Infrastructure, not only offers common infrastructure, components, and management from x86 to Superdome, but also extends the Integrity RAS legacy. Read now

Privacy regs won't kill innovation so stop whining
The founder of the Reputation.com Web site criticized Internet industry giants who claim that any regulation to try to protect the privacy of consumers online would stifle innovation. A Microsoft executive at the Privacy Identity Innovation Conference 2011 agreed, but only up to a point, warning that at this early stage in the digital age, the wrong regulation can have "a chilling effect." Read... Read More

A botched fix, not legal demands, nixed SCADA security talk
Government didn't pull SCADA security talk. Rather, it was a legitimate need for caution, presenters contend. Read More

How to stop your executives from being harpooned
'Whaling' is a growing security threat that uses personalized phishing techniques to get your most sensitive data and access to your key networks Read More


WHITE PAPER: BMC Software

Answers to Tough Questions about SaaS
When it comes to Software as a Service, opportunities abound for improved and simplified IT Service Management. With solutions like BMC Remedy OnDemand, organizations can cut costs, advance ITSM and simplify upgrades. If you're considering the move to SaaS, read this list of common questions. Learn More Today!

Everything's a scam ... or so it seems
An editor at Salon recently wrote an excruciatingly candid account of her having been snookered by an Internet scam. Read More

Check Point's new security blades cut both ways
If you're in the market for endpoint protection, Check Point's new R80 Unified Endpoint Security Management product shows promise. Read More

PlayStation Network hack will cost Sony $170M
Sony expects the hack of the PlayStation Network and will cost it ¥14 billion (US$170 million) this financial year, it said Monday. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

A quick guide to '4G' phones
We've created this handy guide to 4G smartphones – all of which are based on the Android operating system right now – to help you look past the marketing rhetoric and learn what to really expect from these phones.

MOST-READ STORIES

  1. Windows debugging made easy
  2. iPhone 5 rumor rollup for the week ending May 20
  3. 10 things IT groups need to know about The Rapture
  4. Cisco sued for PoE patent infringement
  5. Microsoft: One in 14 downloads is malicious
  6. How to protect smartphones and tablets
  7. Cisco to dump Linksys, WebEx?
  8. IT consultant accidentally live blogs Bin Laden raid
  9. Cisco debuts 'private cloud' controller
  10. Six rising threats from cybercriminals

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment