Friday, June 17, 2011

Cisco backs embattled RSA SecurID in new security architecture

FTC warns of cell phone radiation scams | Firms target mobile security hole with antiphishing browser

Network World Security

Forward this to a Friend >>>


Cisco backs embattled RSA SecurID in new security architecture
With all of the recent security problems around RSA's SecurID two-factor authentication technology as a backdrop, Cisco today made it clear that it's still a major supporter of SecurID by including the two-factor authentication token as a main security component in what Cisco calls its "PCI 2.0 Architecture" of assembled Cisco, EMC, RSA, VMware and HyTrust products. Read More


WHITE PAPER: Dell

Foundations of Security Information Management
This guide examines the details of each of these processes and provides best practices to build a foundation for SIM. Learn more.

WHITE PAPER: CA Technologies

Ponemon: Security of Cloud Computing Providers
This report offers the cloud providers beliefs on the state of cloud security. In addition, it compares the findings from both reports, determining similarities and discrepancies between cloud computing users and providers. Learn More

FTC warns of cell phone radiation scams
As soon as the new concerns that cell phones might pose a radiation risk to users, scammers were sharpening their online skills to take advantage of the situation.  That's why the Federal Trade Commission today told cell phone users to avoid products that supposedly "shield" users from cell phone emissions. More on health news: High-tech healthcare technology gone wild Read More

Firms target mobile security hole with antiphishing browser
Lookout joins other security firms, releasing a browser for smartphones that can blacklist known phishing sites. Read More


WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

ADP acknowledges system intrusion, says one client hit
Automatic Data Processing (ADP) today disclosed that it has suffered a system intrusion that it believes has impacted only one client associated with Workscape, the benefits administration platform company it acquired. Read More

Don't dismiss community college grads with degrees in information assurance
The CAE2Y program was established to meet the needs of cybersecurity professionals – not all of whom have baccalaureates and advanced degrees. Zdravkovich emphasized that our society needs all dimensions of diversity in the cybersecurity field. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

Want to stop cybercrime? Follow the money
At Usenix, a cybersecurity researcher explains how the key to stopping computer criminals is in the economics of cybercrime. Read More

Adobe pushes Reader silent updates
Adobe has switched on silent updating for its popular Reader PDF viewer, the company announced Tuesday. Read More

Senators propose mobile location privacy law
Following a recent uproar over the ways in which Apple and Google collect location information from mobile users, two U.S. senators have proposed a law that would require companies to get permission from mobile users before sharing that information with third parties. Read More

Court says Comerica Bank must pay after customer is hacked
A Michigan court has ruled that Comerica Bank is liable for a US$560,000 cyberheist, saying the bank should have done a better job to spot millions of dollars in fraudulent transactions after one of the bank's customers was tricked in a phishing attack two years ago. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

10 SaaS companies to watch
These days, companies are applying the software-as-a-service (SaaS) model to just about everything, from core business functions, including IT, to industry-specific processes. This list, compiled with the help of SaaS trend watchers and users, provides a representative look at what types of software you'll find offered in the cloud.

MOST-READ STORIES

  1. FBI dumpster diving brigade coming to a trash can near you
  2. Chrome nearly replaced Firefox in Ubuntu Linux
  3. 10 iPhone passcodes to pass on
  4. EU ministers seek to ban creation of 'hacking tools'
  5. Want to stop cybercrime? Follow the money
  6. Ubuntu breaks from the Linux pack
  7. Cisco distracted by reorg
  8. Cisco backs embattled RSA SecurID
  9. Gartner: IT should be planning, moving to private clouds
  10. Cisco fabric launch seeks to undermine Arista, IBM

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment