Tuesday, August 09, 2011

Online reputation management: Manipulating search engines

DARPA expands insider threat research | Microsoft's Push Back Against Spammers

Network World Security Strategies

Forward this to a Friend >>>


Online reputation management: Manipulating search engines
Online reputation management (ORM) works much in the same way: accentuating the positives and giving the impression of mass approval. Read More


WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

WHITE PAPER: GFI Software

Email Security in Small and Medium-sized Businesses
No organization can afford to operate without an email security strategy. The risk landscape is constantly changing with new threats surfacing every day. This white paper looks at email security in small and medium businesses, the solutions available and what features SMBs cannot do without. Read now

DARPA expands insider threat research
The ability to detect insider threats and behaviors from a plethora of live data is the goal of an ambitious research program being undertaken by the military's Defense Advanced Research Projects Agency (DARPA). Last week DARPA took a big step toward realizing the potential of the program it calls Anomaly Detection at Multiple Scales (ADAMS) by picking Raytheon to help develop it further. Read More

Microsoft's Push Back Against Spammers
It's fashionable to beat up Microsoft as the gang that can't shoot straight. The willingness of the press and individuals alike to fall for the "IE users are dumb" scam is a great example of this. Read More

Top 8 ways feds (and corporate users) can take advantage of green IT
How does the federal government go about implementing green IT? According to a report out today from the Government Accountability Office, the feds have adopted a number of practices that are useful not just for government IT but all manner of private and public company IT groups as well. These include everything from dedicated funding for green products, to improved employee training and reducing use of paper. Read More


WHITE PAPER: Quest Software

Protect, Restore Exchange in Virtual Environments
Disaster has struck. Your virtual Exchange system is down and the pressure's on. There's only one way to successfully avoid a potential catastrophe: You need a well-documented disaster recovery plan. Discover proven techniques to prevent data loss in this Quest white paper. Learn more.

Defcon: The lesson of Anonymous? Corporate security sucks
Anonymous has run up quite a score against corporations, governments and law enforcement agencies, but for all these warnings corporate executives are turning their heads from the real problem -- their network security is terrible, a panel of experts concluded at Defcon. Read More

Defcon: The security penetration testing quagmire
The relationship between CISOs and security penetration testers is anything but clear cut and raises ethical issues for both parties, a Defcon crowd heard from a former CISO. Read More

Cyber-espionage attacks threaten corporate data in new unrelenting ways
Stealthy, sometime long-term cyber-espionage attacks to steal sensitive proprietary information -- what some now call "advanced persistent threats" (APT) -- have become a top worry for businesses. Read More


WHITE PAPER: Kaseya

How to Launch a Successful IT Automation Initiative
In this paper, we'll look at IT automation from the corporation's perspective, and discuss the steps organizations should take before launching such an initiative. We'll hear from companies that successfully implemented computer automation platforms, what their early steps were and what they would do differently if they could repeat the process. Read now

Freedom and privacy, R.I.P.
Gibbs sees two kinds of privacy, and if both aren't already lost, they soon will be. Read More

Healthcare IT Consumers Fear Data Loss From EHR Systems
Nearly 80% of U.S. consumers say that they're wary of electronic health records because they fear that their personal information might be stolen or lost. Read More

Former Cisco engineer indicted on hacking charges
A former Cisco engineer at the center of an extradition controversy has been indicted by a federal grand jury on computer hacking charges. Read More

Black Hat: Apple does well but Microsoft does better with enterprise security
While still not great, the operating systems behind Apple desktops, laptops and phones are getting more secure, researchers at Black Hat say. While not recommended for corporate use unless it's in islands within larger networks, the OSX operating system has made strides, says Alex Stamos, who lead a team of researchers from iSec Partners that researched the OSX and Windows 7 operating systems. Read More

Security rundown for week ending Aug. 5, 2011
If you'd never heard the phrase 'advanced persistent threat' before, you may have gotten an ear full of it the past week in a collection of news stories that used the APT term to describe a variety of network security problems that are causing big problems. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Chromebooks you can buy now
Here's a roundup of computing devices that run Chrome OS, a few which you can buy now, or which may be on the way.

MOST-READ STORIES

  1. 4 reasons Windows Phone 7 will beat iPhone and Android
  2. Former Cisco engineer indicted on hacking charges
  3. iPhone 5 rumor rollup for the week ending Aug. 5
  4. 16 milestones of a million, a billion or more ... from the past month
  5. Cisco nabs Juniper sales execs
  6. Researcher picks apart Sophos antivirus package
  7. Apple does well but Microsoft does better with enterprise security
  8. AntiSec hackers dump data after hacking police websites
  9. Scariest Black Hat story so far: Power plants at risk
  10. Black Hat: routers using OSPF open to attacks

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment