Thursday, June 16, 2011

Tutorial: Cisco Routers Add Web Security with Cisco ScanSafe

Microsoft issues first patch for IE9 amidst 34 holes closed today | NASA, DARPA looking for your input for futuristic space exploration dialogue

Network World Security

Forward this to a Friend >>>


Tutorial: Cisco Routers Add Web Security with Cisco ScanSafe
Cisco launched this feature to the market last month at Interop. In a nutshell, this IOS feature provides intelligent, identity aware, traffic redirection to the Cisco ScanSafe web security cloud offering. ScanSafe provides the following web security features as a cloud service: URL Filtering Scanlets analyze all elements of a web request including HTML, JavaScript, Flash and even obfuscated... Read More


RESOURCE COMPLIMENTS OF: Sophos

FREE Tool - Sophos Computer Security Scan
Scan up to 200 computers for viruses, spyware, Rootkits and other threats that your AV missed. Click to continue

WHITE PAPER: F5 Networks

Manageable Application Security
Investments in security solutions have to provide a clear value, which equals additional time spent collecting and documenting proof of this value. The latest version of F5 BIG-IP Application Security Manager(tm) (ASM), v10.1, addresses information overload and the need for agility in implementation. Learn more!

Microsoft issues first patch for IE9 amidst 34 holes closed today
As expected, today's Patch Tuesday is a whopper. Microsoft released 16 security updates (nine critical and seven important) addressing 34 vulnerabilities, including the first patch for Internet Explorer 9 and a rare patch for Hyper-V. The remaining patches fix vulnerabilities in Microsoft Windows, Microsoft Office, Internet Explorer, .NET, SQL, Visual Studio, Silverlight, VML  and ISA. For nine... Read More

NASA, DARPA looking for your input for futuristic space exploration dialogue
DARPA and NASA Ames Research Center today said they are soliciting abstracts, papers, topics and members for discussion panels, to be part of the 100 Year Starship Study Symposium to be held in Orlando, Fla.,  from September 30 through October 2, 2011. Read More

FBI Dumpster Diving Brigade Coming Soon to Snoop in a Trashcan Near You
You might think you are interesting, but are you a person of interest? Let's hope not, since the 2011 edition of the FBI's Domestic Investigations and Operations Guide invites agents to take up dumpster diving, rummaging full-throttle through your trash while snooping in your life. Read More


WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

What happens if you catch a hacker and must deal with the FBI?
After writing an article about a Department of Justice report, stating the FBI focuses on catching kiddie porn perps and many agents lack the know-how to work on national security issues, I was contacted by a man who says he's worked with the FBI to catch hackers. You might be surprised at how hard it can be for an IT professional to work with the FBI on a hacker case. This is one IT professional's... Read More

U.S. questioned China about Change.org attack
The U.S. State Department questioned the Chinese government about a cyberattack that had temporarily shutdown Change.org after the site held a petition urging Chinese authorities to release artist Ai Weiwei from custody. Read More

Smartphones and tablets create huge corporate security challenge
Adapting security and management for the new generation of mobile devices -- everything from the Apple iPhone and iPad to Google Android devices to name a few -- is turning out to be a huge corporate challenge. Read More


WHITE PAPER: F5 Networks

Secure iPhone Access to Corporate Web Applications
This technical brief describes how the BIG-IP Edge Portal app for iOS devices provides simple, streamlined access to web applications that reside behind BIG-IP APM, without requiring full VPN access, to simplify login for users and provide a new layer of control for administrators. Learn More!

Adobe patches second Flash zero-day in 9 days
For the second time in nine days, Adobe on Tuesday patched a critical vulnerability in Flash Player that hackers were already exploiting. Read More

Bill proposed to regulate collection, use of GPA tracking data
Two lawmakers today proposed a bipartisan bill that would regulate how law enforcement agencies and companies can access and use geo-location data gathered from cell phones, tablets and other mobile devices. Read More

EU ministers seek to ban creation of 'hacking tools'
Justice Ministers across Europe want to make the creation of hacking "tools" a criminal offence, but critics have hit back at the plans saying that they are unworkable. Read More

Microsoft patches critical IE9, Windows bugs
Microsoft today patched 34 vulnerabilities in Windows, Internet Explorer, Office and other software, 15 of them labeled "critical" by the company. Read More

LulzSec attacks gaming sites ... just for laughs
The hacking group known as LulzSec called it Titanic Takeover Tuesday. Gamers called it by a variety of names, many of which cannot be reprinted here. But for system administrators at a handful of gaming companies, Tuesday, June 14 was a nightmare: the day their websites went down under an online attack. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

10 SaaS companies to watch
These days, companies are applying the software-as-a-service (SaaS) model to just about everything, from core business functions, including IT, to industry-specific processes. This list, compiled with the help of SaaS trend watchers and users, provides a representative look at what types of software you'll find offered in the cloud.

MOST-READ STORIES

  1. What happens if you catch a hacker and must deal with the FBI?
  2. Chrome nearly replaced Firefox in Ubuntu Linux
  3. The 6 hottest new jobs in IT
  4. Ubuntu breaks from the Linux pack
  5. Smartphones and tablets create huge corporate security challenge
  6. Apple surrenders to Nokia in patent fight, others may follow
  7. Five things we love and five things we hate about Ubuntu 11.04
  8. 10 iPhone passcodes to pass on
  9. Toshiba launches new IP phone system
  10. Data center startups emerging to solve virtualization, cloud problems

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment