Search This Blog

Tuesday, June 28, 2011

Too much access to the Internet?

Network World Security Strategies - Newsletter - networkworld.com
They're back! Data breach notification bills resurface | The 10 worst cloud outages (and what we can learn from them)

Network World Security Strategies

Forward this to a Friend >>>


Too much access to the Internet?
After the President of the United States announced that Osama Bin Laden had been killed, published reports revealed how the terrorist leader accessed the Internet to send e-mails without being intercepted by U.S. intelligence services. Adam Goldman and Matt Apuzzo of the Associated Press wrote that "Bin Laden's system …. left behind an extensive archive of email exchanges for the U.S. to scour." There were "thousands of messages and potentially hundreds of email addresses…." Read More


WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

WHITE PAPER: F5 Networks

Secure iPhone Access to Corporate Web Applications
This technical brief describes how the BIG-IP Edge Portal app for iOS devices provides simple, streamlined access to web applications that reside behind BIG-IP APM, without requiring full VPN access, to simplify login for users and provide a new layer of control for administrators. Learn More!

They're back! Data breach notification bills resurface
Following a string of high-profile data breaches, lawmakers push (again) for federal data breach disclosure. Read More

The 10 worst cloud outages (and what we can learn from them)
Sending your IT business to the cloud comes with risk, as those affected by these 10 colossal cloud outages can attest Read More

Anonymous claims LulzSec members, steps up attacks
The decision by computer hacking group LulzSec on Saturday to fold operations may be helping another online group, Anonymous, which stepped up attacks over the weekend. Read More


WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

FTC's Brill: New online privacy tools needed
The mobile industry should adopt do-not-track tools, an FTC commissioner says. Read More

Rootkit infection requires Windows reinstall, says Microsoft
Microsoft is telling Windows users that they'll have to reinstall the operating system if they get infected with a new rootkit that hides in the machine's boot sector. Read More

Rapid7 Expands Its Support Of Open Source Security Projects
I was talking last week to my friend HD Moore who founded and leads the development team for Metasploit at Rapid7. He told me about yet another open source project that Rapid7 has been supporting with financial and engineering support. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

Sony 'cut corners' in protecting user data, lawsuit alleges
Three PlayStation Network users charge that Sony 'cut corners' in its efforts to protect personal data of its users. Read More

LulzSec calls it quits after 50 days of 'mayhem'
The computer hacking group LulzSec said Saturday it had ended its campaign of cyberassaults on government and corporate websites and that it was time for it to "sail into the distance." Read More

Apple patches 36 bugs in Snow Leopard, preps OS for Lion upgrade
Apple on Thursday released the final feature update for Snow Leopard as it prepared users' Macs for the upcoming Lion upgrade set to ship next month. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

The 7 worst tech merger ideas ever
In this slideshow, we'll take a look at seven proposed mergers that we hope will never see the light of day, as their consummation would likely mean the end of the entire tech industry and possibly even the entire world.

MOST-READ STORIES

  1. Desktop PCs: Dead as a doornail, or maybe just a fax machine
  2. IPv6 in the enterprise: Network management using IPv6
  3. The iPhone 5 rumor rollup for the week of June 24
  4. Cisco defending base against HP, Juniper
  5. LulzSec calls it quits after 50 days of 'mayhem'
  6. Why I dumped my 4G Android for an iPhone
  7. Cisco's core share holds steady
  8. Citi hackers made $2.7 million
  9. The 10 worst cloud outages (and what we can learn from them)
  10. CFOs lack faith in CIOs and IT teams, survey shows

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: