Search This Blog

Tuesday, June 21, 2011

Experts risk indigestion without RISKS DIGEST

IT admins gone wild: 5 rogues to watch out for | Vulnerability analysis tools add compliance features

Network World Security Strategies

Forward this to a Friend >>>


Experts risk indigestion without RISKS DIGEST
In the last article, I got sidetracked into demonstrating that the number of articles published every year about security issues has been growing steadily for the last 30 years. Today I'll remind readers of (or perhaps introduce newcomers to) a valuable resource for keeping up with fundamental issues in security: The Risks Forum. Read More


WEBCAST: F5 Networks

Ensuring High Availability for Client Access
F5's integrated application delivery solutions for Microsoft Exchange Server 2010 provide the required hardware load balancing for CAS servers. Learn More!

WHITE PAPER: F5 Networks

Brute Force Protection for Web Applications
Both Denial-of-Service (DoS) and Brute Force Attacks have existed for many years, and many network devices tout the ability to withstand them. However, most of today's DoS attacks target layer 7 (L7) by overwhelming applications with seemingly valid requests and Brute Force programs can send more than one million attempts per second. Learn More!

IT admins gone wild: 5 rogues to watch out for
You can't survive without them. They wield enormous power over your systems, networks, and data -- the very lifeblood of your organization. Few people outside IT have any understanding of what they do, and fewer still exercise any oversight over their actions. Read More

Vulnerability analysis tools add compliance features
Compliance is a natural extension of a vulnerability analysis tool. Normal vulnerability scanning includes searching for unpatched systems, unprotected directories, and other errors in configuration. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

Do you know where your security holes are?
We all worry that there's some lurking security problem in our servers. We do what we can, patching, following best practices, keeping up-to-date with training and news. But wouldn't it be great to have an automated tool to check our work? That's the promise of vulnerability analyzers: products that detect problems in configuration, applications, and patches. Read More

NSA wants bulletproof smartphone, tablet security
The National Security Agency, America's high-tech spy agency which also plays a key role in approving hardware and software for use by the Department of Defense, wants to be able to outfit military personnel with commercial smartphones and tablets -- but based on a NSA security design. Read More


WHITE PAPER: F5 Networks

Providing Security and Acceleration for Remote Users
Delivering applications to remote users is a significant undertaking. Applications need to be available, and they must be delivered securely and quickly. Through a range of products, F5 has solved the security plus acceleration challenge for remote users with BIG-IP Edge Gateway and BIG-IP APM. Read More!

Attackers exploit latest Flash bug on large scale, says researcher
Hackers are aggressively exploiting a just-patched Flash vulnerability "on a fairly large scale," according to a Shadowserver Foundation researcher. Read More

82-year-old Father of the cell phone buys new smartphone every 2 months
Martin Cooper isn't just the father of the cellular phone - he's also an avid user. Cooper, who made the world's first cellular phone call as a Motorola executive in 1973 and who now serves as CEO of wireless software company ArrayComm, says he buys a new smartphone every two months just to keep himself up-to-date on the newest technological trends. Read More

How we tested vulnerability analyzers
We developed a test methodology and evaluation criteria in six main areas, including results reporting, product controls and manageability, scan results, vulnerability workflow features, interoperability, and updates and protocol support. Read More

Vulnerability analyzers offer Web scanning as an option
Web scanning is different from vulnerability scanning because it looks for bugs in the Web apps themselves, rather than the software installed on the Web server. For example, all of the vulnerability scanners told us about an old embedded system on our network vulnerable to a cross-site scripting attack because of an old version of PHP. That's just normal vulnerability scanning, and depending on your Web applications and Web server settings may turn out a lot of false positives. But actually finding an exploitable script on a Web site requires a more intense search, coming in from the outside, and a more specialized type of scanner. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

10 SaaS companies to watch
These days, companies are applying the software-as-a-service (SaaS) model to just about everything, from core business functions, including IT, to industry-specific processes. This list, compiled with the help of SaaS trend watchers and users, provides a representative look at what types of software you'll find offered in the cloud.

MOST-READ STORIES

  1. Gartner: IT should be planning, moving to private clouds
  2. Wi-Fi client surge forcing fresh wireless LAN thinking
  3. How RIM is getting left behind
  4. Debate goes on whether HTML5 is "Holy Grail"
  5. The funniest sites on the Web
  6. Many disappointed in virtualization, cloud computing
  7. Attackers exploit latest Flash bug on large scale
  8. 17 super-specific social networks
  9. Do you know where your security holes are?
  10. Cisco distracted by reorg

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: