Monday, July 18, 2011

Imagine: Massively scalable multi-core security

Researcher finds dangerous vulnerability in Skype | Banking Trojan hits Android phones

Network World Security

Forward this to a Friend >>>


Imagine: Massively scalable multi-core security
Desktops and servers are being transformed by virtualization and multi-core CPUs, but that effect is a bit harder to see in security. Multi-core CPUs especially hold the possibility of completely transforming how and where we do security. One of the effects is to shift more of the security functions into the network. Another may be to radically change the software architecture within and across security appliances. Read More


WHITE PAPER: BMC

Moving to a Cloud-based Delivery Model
Help Desk software as a service is attractive to many IT departments. It offers the same benefits of traditional IT help desk solutions, in addition to reducing capital expenses, accelerating implementation, and providing easier upgrades. This paper explores considerations for implementing IT service management in-house or as a service. Read Now!

WHITE PAPER: Palo Alto Networks

Next-Generation Firewall for Dummies eBook
This book provides an in-depth overview of next-generation firewalls. It examines the evolution of network security, the rise of Enterprise 2.0 applications and their associated threats, the shortcomings of traditional firewalls, and the advanced capabilities found in next-generation firewalls. Read now!

Researcher finds dangerous vulnerability in Skype
A security consultant has notified Skype of a cross-site scripting flaw that could be used to change the password on someone's account, according to details posted online. Read More

Banking Trojan hits Android phones
A banking Trojan that has plagued Symbian, BlackBerry and Windows Phone users has now made its way to Android devices. Read More

Oracle to issue 78 bug fixes
Oracle is planning to issue 78 patches covering a number of its software products on Tuesday, including 13 fixes for its flagship database, according to a statement posted to its website on Thursday. Read More


WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

Building the Borg: US intelligence agency wants to know how your overtaxed brain works
This one sounds like it comes right out of a science-fiction writer's nightmare. A US intelligence agency wants to develop applications based on the way the human brain makes sense of large amounts of haphazard, partial information. Read More

Critics: U.S. cybersecurity plan has holes, few new items
The new Strategy for Operating in Cyberspace issued by the Department of Defense on Thursday covers a collection of topics that have been discussed for years and leaves a number of important unanswered questions, critics said. Read More

US hails progress with Russia on cybersecurity cooperation
Russia and the U.S. are working to reduce chances for a cybersecurity incident that could damage the countries' relationship, according to the top cybersecurity adviser to U.S. President Barack Obama. Read More


WHITE PAPER: GFI Software

Protecting Against the New Wave of Malware
Learn why traditional antivirus approaches don't work and why a new approach to endpoint security is required to better protect your company from malicious threats. Learn about the scope of the malware problem and strategies that can help you defend against evolving malware threats. Read now!

Trust nobody
I really can't stress the importance of doing your own legwork when it comes to doing server discovery. And in this case I'm not talking about discovering the servers themselves, but discovering the setup of the resources of the server. Read More

Face Detection Technology Tool Now Detects Your Moods Too
When Facebook automatically enabled facial recognition for photo tagging purposes last month, the company was forced to apologize after the backlash from angry users who had their privacy invaded by default yet again. Was that anger caused by Facebook changing the privacy settings, or because the photo tagging used facial recognition software, or a bit of both? Face.com, a face detection and recognition... Read More

Data protection survey highlights enterprise IT concerns
SEPATON, a vendor of disk-based data protection systems, recently announced the results of its annual SEPATON Data Protection Index, a survey of IT professionals in enterprises with at least 1,000 employees and at least 50TB of primary data. The survey, which was conducted during the second quarter of 2011, tabulated results from 168 IT professionals. The survey was intended to elicit concerns about data protection and disaster prevention issues facing enterprise data centers. Read More

US military learning cybersecurity lessons from businesses
In its new cyberdefense strategy, the Pentagon is drawing on lessons about agility, lifecycle management and supply-chain protection that have already been learned by private corporations. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

10 HP TouchPad apps for newbies
HP took the wraps off its shiny new webOS-based tablet - the TouchPad - on July 1. And like the Apple iPad, the Motorola Xoom and the BlackBerry PlayBook, this tablet debuts with a pack of applications customized for the tablet form factor.

MOST-READ STORIES

  1. Mobile security risks: comparing iOS to Android
  2. 7 free Windows tune-up tools and tips
  3. It's Mango vs. Apple in a Battle of the Fruitphones
  4. iPad-controlled supercomputing as a service coming this fall
  5. Cisco's resolve unflagging despite massive layoffs coming
  6. Cisco injects new life into Catalyst 6500 switch
  7. No IT? No offices? No problem for this virtual firm
  8. Why Microsoft's Windows 8 strategy is puzzling the pundits
  9. HP fires back at Cisco's Sup 2T
  10. Extreme slashes 16% of workforce

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment