Wednesday, June 22, 2011

Northrop Grumman constantly under attack by cyber-gangs

LulzSec hacker group denies it has stolen UK census | A new security architecture for the cloud

Network World Security

Forward this to a Friend >>>


Northrop Grumman constantly under attack by cyber-gangs
About a dozen separate legions of organized hackers have been diligently attempting for years to break into aerospace and defense company Northrop Grumman to steal sensitive information, the company's chief information security officer (CISO) said at a Gartner security conference. Read More


WHITE PAPER: Dell

IT Managers Face Security Challenges with Mobile Devices
A recent IDG survey reveals data security is the top barrier to supporting employees' mobile devices. Read more

WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

LulzSec hacker group denies it has stolen UK census
The hacker group LulzSec denies it has stolen the entire results of the 2011 census for the United Kingdom, but if someone else has, it endorses the theft. Read More


WHITE PAPER: F5 Networks

Manageable Application Security
Investments in security solutions have to provide a clear value, which equals additional time spent collecting and documenting proof of this value. The latest version of F5 BIG-IP Application Security Manager(tm) (ASM), v10.1, addresses information overload and the need for agility in implementation. Learn more!

A new security architecture for the cloud
The Open Group's Security for the Cloud and SOA Project publishes "An Architectural View of Security for Cloud." Read More


WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

UK police arrest teen from Lulz Security for DDOS attack
U.K. police arrested a 19-year-old on Monday for allegedly attacking a police website earlier in the day, in what is the first arrest connected with the rogue hacking group Lulz Security. Read More

Social networking self-regulation isn't working says EU
A test conducted by the European Commission on 14 social networking sites found that only two of them make minors' profiles private by default. Read More

New from Aveksa -- RSA take note
Aveksa just announced version 5.0 of its suite of Access Governance automation solutions, and there's a lot of meat in this release. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

The 7 worst tech merger ideas ever
In this slideshow, we'll take a look at seven proposed mergers that we hope will never see the light of day, as their consummation would likely mean the end of the entire tech industry and possibly even the entire world.

MOST-READ STORIES

  1. Gartner: IT should be planning, moving to private clouds
  2. 12 ways the cloud changes everything
  3. First look at Windows Azure
  4. Pilots spar over wisdom of relying on iPads in the cockpit
  5. Most IT pros don't fear losing their jobs to the cloud
  6. NSA wants bulletproof smartphone, tablet security
  7. Wi-Fi client surge forcing fresh wireless LAN thinking
  8. How RIM is getting left behind
  9. Company claims it can disregard GPL requirements
  10. Dropbox left document storage accounts open for four hours

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment