Search This Blog

Thursday, September 01, 2011

Information assurance must adapt to changing technology

Apache patches Web server DoS vulnerability | Report: Malicious Infections on 99% of Enterprise Networks

Network World Security Strategies

Forward this to a Friend >>>


Information assurance must adapt to changing technology
The new semester has begun at Norwich University and we've had a couple of class sessions for the IS340 Introduction to Information Assurance course. One of the changes I've made in the last year is that I no longer inflict death by PowerPoint on my students; instead of pontificating at them, I just distribute printouts of the lectures (six slides per page), make the PDF and PPTX versions of the slides available to the students through a folder on the course Web site and guide the students in vigorous discussion in every class meeting. We also use a learning platform (an implementation of Moodle) for online discussions, some tests, and submission of assignments. Read More


WHITE PAPER: Fujitsu

Key Considerations before Virtualizing
This whitepaper examines the various virtualization technologies and shows the range of ICT infrastructure layers where they are applied. It also shows how Fujitsu incorporates these technologies into end-to-end solutions as an essential part of its Dynamic Infrastructures strategy. Read now!

WHITE PAPER: GFI Software

Email Security in Small and Medium-sized Businesses
No organization can afford to operate without an email security strategy. The risk landscape is constantly changing with new threats surfacing every day. This white paper looks at email security in small and medium businesses, the solutions available and what features SMBs cannot do without. Read now

Apache patches Web server DoS vulnerability
The Apache open-source project patched its Web server software Tuesday to quash a bug that a denial-of-service tool has been exploiting. Read More

Report: Malicious Infections on 99% of Enterprise Networks
A new breed of cyber-attacks are both sophisticated and successful, leaving 99% of enterprises with a security gap and malicious infections in their networks. According to a new report from FireEye Malware Intelligence Lab, 80% of enterprises were hit with more than 100 new infections per week in the first half of 2011. Read More

IBM acquiring i2 for criminal mastermind software
Expanding its portfolio of analytic software for state and local governments, IBM is in the process of acquiring security analytics software provider i2, the companies announced Wednesday. Terms of the deal were not disclosed. Read More


WHITE PAPER: ExtraHop

Application Performance Management
In this eGuide, Network World, with sister publication CIO, offer news on the latest trends, best practices, and straightforward advice on these solutions and the challenges of managing application performance. Learn More!

Will climate engineering ever be ready for prime time?
You may or may not be old enough to remember the TV commercial for margarine that had the tag line was "It's not nice to fool Mother Nature." But that commercial came to mind as I was reading a report out recently that looked at the viability of large climate engineering projects that would basically alter large parts of the atmosphere to reduce greenhous Read More

VMworld's quirkiest moments
The VMworld Conference here, attended by more than 19,000 people, is highlighting the dynamic creativity of VMware's software division managers and technical staff as they present what's in the works for virtualization of desktops, servers and their management. But that doesn't mean this show isn't without its quirky moments. Here are a few: Read More

Top cybersecurity concerns: Malicious code, employees run amok
When 3,300 information-technology professionals were asked about cybersecurity, they said malicious code attacks accounted for the main type of cyberattack their organizations suffered during the past year, although "internal unintentional actions" by well-meaning insiders also wreaked havoc. Read More


WHITE PAPER: Kaseya

How to Launch a Successful IT Automation Initiative
In this paper, we'll look at IT automation from the corporation's perspective, and discuss the steps organizations should take before launching such an initiative. We'll hear from companies that successfully implemented computer automation platforms, what their early steps were and what they would do differently if they could repeat the process. Read now

4 simple steps to bulletproof laptop security
Follow these tips, tools, and techniques to protect your Windows notebook against theft, intrusion, and data loss Read More

Trend Micro: Virtualization changing our anti-malware business big time
Virtualization -- in particular Trend Micro's close alliance with VMware -- is bringing about a strategic shift in Trend's anti-malware business as its products become designed for use with VMware's vShield technology. Read More

VMworld: Security, regulatory concerns still a challenge in virtualization
While VMware users harbor little doubt about the cost savings and productivity gains brought by virtualizing their networks, security concerns still exist on many fronts, whether it's figuring out how to meet regulatory compliance with auditors, or evaluating cloud services. Read More

Apple reportedly on another lost iPhone scavenger hunt
Apple is reportedly trying to track down an iPhone prototype lost by a company employee at a San Francisco bar – an incident that sounds an awful lot like the high-profile lost-then-sold iPhone prototype scandal from last spring. Read More

Microsoft's 5 biggest weaknesses
Microsoft's position as the dominant provider of software to consumers is at risk. Here are five reasons why. Read More



SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. 'You are an idiot' if you don't give back to open source
  2. Google one of many victims in SSL certificate hack
  3. Cisco, VMware expand collaboration
  4. IPv6: What you need to do now
  5. The ribbon is winding further into Windows
  6. Thinnest material in the world could boost Internet speeds tenfold-plus
  7. Sprint's mysterious Oct. 7 event fuels more iPhone, LTE speculation
  8. Google, OpenDNS deploy DNS tweak for faster browsing
  9. Top cybersecurity concerns: Malicious code, employees run amok
  10. Death by Morto A? It's your own fault, says Microsoft

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: