Wednesday, July 27, 2011

Black Hat Pwnie Award winner will be a criminal

Black Hat: Embedded Web servers open printer, scanner security holes | E-health records still scare most of us

Network World Security

Forward this to a Friend >>>


Black Hat Pwnie Award winner will be a criminal
Law enforcement may be interested to see if anyone actually shows up to this year to accept the annual Pwnie Award for Epic Ownage at Black Hat, since all the nominees face possible criminal charges. Read More


WHITE PAPER: Vormetric

Encryption Success Toolkit
Gartner Research VP, Eric Ouellet, shares proven strategies to protect massive sensitive information stores. Deploy and manage encryption without complexity in both traditional and cloud environments. You get expert insights as well as actionable information about encryption strategies. Read now!

RESOURCE COMPLIMENTS OF: Palo Alto Networks

Next-Generation Firewalls Decision Guide:
When comparing Palo Alto Networks with Check Point, it's important to understand the underlying architecture of the two solutions because they have far-reaching implications in terms of security effectiveness and performance. Simply stated, a security 1.0 architecture doesn't work in an enterprise 2.0 world. Click to continue

Black Hat: Embedded Web servers open printer, scanner security holes
It's fairly simple to find corporate or consumer printers and scanners online and, without breaking into them, get a hold of documents that these devices recently processed. Read More

E-health records still scare most of us
Consumers just don't trust electronic health records to securely store their personal information, according to a survey by Harris Interactive. Read More


WHITE PAPER: Fujitsu

New TPC-E Benchmark Results Revealed
A "glue-less" design, where no additional hardware is necessary to run all eight CPUs and all memory slots enable the shortest route between processors, memory modules and I/O hubs inside a single chassis. It's just one of the many reasons Fujitsu servers are leading the way in TCP-E benchmarks and overall price/performance. Read now!

Hunting for an email service with extreme wishlist for privacy and security?
Being a big privacy supporter, and after considering a list of requirements/restrictions, it can be a bit challenging when looking for a new email service. My wishlist of requirements included being a secure email service that encrypts, one that supports anonymity, is not-based-in-the-US for easy surveillance, supports Tor, and is free. This was my hunt for such a service. Read More

Coming to a store near you: health insurance exchanges
By 2014, states must deploy public health insurance exchanges, giving millions of Americans purchasing power that could change the landscape for health insurers. Private retailers are already eying their own online exchanges -- possibly as in-store kiosks. Read More


WHITE PAPER: Raritan

Best Practices: KVM Smart Card Authentication Systems
Selecting a smart card-enabled KVM system? Choose one that supports PKI authentication to multiple servers from a single location and makes the necessary KVM feature adjustments to enable seamless use of the reader. This White Paper examines best practices when evaluating a Smart Card solution. Learn More

Zurich lawsuit against Sony highlights cyber insurance shortcomings
A brewing legal dispute between Sony and one of its insurers over data breach liability claims highlights the challenges that companies can sometimes face in getting insurance companies to cover expenses arising from cybersecurity incidents. Read More

NASA teams with Chevron to build energy exploration technologies
NASA's Jet Propulsion Laboratory and Chevron today said they would partner to build a variety of energy sensing and drilling technologies that could be used on Earth and in space. Read More

Google works to soothe users over real name controversy
Google has heard the public outcry about its name restrictions and the way it killed off many Google+ user accounts and is working fast to fix the problem. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. Wham Bam Google Ban: No Pseudonyms on Google Plus Profiles
  2. The 5 biggest IT security mistakes
  3. How to implement IPv6 in a Windows environment: an expert guide
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. 15 incredibly useful (and free) Microsoft tools for IT pros
  6. Cisco rival Juniper lands Microsoft's Muglia
  7. Law firm rallies AT&T customers to block T-Mobile merger with lure of cash
  8. 10 technologies that will change the world in the next 10 years
  9. 10 things you shouldn't be able to buy online
  10. The problem with weak passwords and hijacked Hotmail

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment