Monday, September 26, 2011

Security roundup: Privacy ground war; malware taunts; Massachusetts data loss stink; is SIEM dead?

New Mac malware poses as PDF doc | Database Security Needs Improvement

Network World Security

Forward this to a Friend >>>


Security roundup: Privacy ground war; malware taunts; Massachusetts data loss stink; is SIEM dead?
Personal privacy or the growing lack thereof was one of the hot security buttons this week. Read More


WHITE PAPER: VeriSign

Approaches to DDoS Protection - A Cost Analysis
All organizations with an online presence or dependence on Internet-based systems need to fortify their defenses against DDoS attacks. Read this paper to learn what an attack can cost an organization, how to develop a DDoS mitigation strategy, and how to get maximum protection from your investment. Read Now!

WHITE PAPER: Coyote Point

Optimizing Popular Microsoft Apps
Maximize your investment in Microsoft applications by improving the speed of their performance. Learn how Application Delivery Controllers, developed exclusively for Microsoft applications, can reduce application latency, maximize bandwidth and server utilization, offload SSL processing, and distribute traffic optimally across the server farm. Read More

New Mac malware poses as PDF doc
Security firms today warned Mac users of a new Trojan horse that masquerades as a PDF document. Read More

Database Security Needs Improvement
Databases store much of the world's most sensitive data so you'd think they'd be well protected with the right layered security defenses, access controls, and logging. Unfortunately, if you made this assumption you'd be incorrect -- databases face a much higher level of risk than most people (and business executives) are aware of. According to ESG Research, 95% of enterprise organizations consider... Read More

Alleged LulzSec Sony hacker arrested
The U.S. Federal Bureau of Investigation has arrested a Phoenix student, claiming that he is one of the LulzSec hackers responsible for a database attack on Sony Pictures computers that claimed more than 1 million victims. Read More


WHITE PAPER: CenturyLink Business

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

Microsoft passes Rustock botnet baton to FBI
Microsoft on Thursday wrapped up its civil case against the still-unnamed controllers of the Rustock botnet and handed off the information gleaned during its investigation to the FBI. Read More

EFF inspects encryption tool for Adium, Pidgin IM clients
The digital watchdog Electronic Frontier Foundation (EFF) lent a technical hand to fix security problems in a tool used to encrypt instant messenger conversations using the Adium and Pidgin programs. Read More

Does Microsoft's Partnership with 'Intent-Driven' Adchemy Protect Consumer Privacy?
If someone shadowed your digital footprints, making notes of who you became a "fan" of on social networks, keeping records where you were checking-in via mobile devices, compiling your data to decipher your intent, would you consider that collection to be tracking your personal info? If that same entity followed you home and gathered more info on what your interests were, would you feel a bit like... Read More


WEBCAST: IBM

Using IBM Tivoli Security Management for z/OS
Administration can be a complex world where security is concerned. The resources spent on administration, management, auditing and compliance can be considerable. Watch the demo, "Using IBM Tivoli Security Management for z/OS," and see how IBM® can help you protect your business—simply, efficiently and more effectively. Learn More

8 surprising hunks of space gear that returned to Earth
NASA and others have had their share of spacecraft parts fall back to Earth Read More

Geekiest cupcake designs
Cupcakes (and a few cakes) decorated for the techie crowd Read More

15 Best iPhone Apps for Busy CEOs
For executive road warriors and super-busy CEOs, the iPhone has become indispensable. Here are 15 must-have free and paid business apps that tap into the great mobile experience and keep executives productive all day long. Read More



SLIDESHOWS

16 essential Android apps for IT pros
There are hundreds of thousands of Android apps, including many that are useful for IT professionals on the job. These apps can help connect to servers, monitor computers, access databases, analyze the airwaves, scan networks, and serve as a reference. Here are 16 of these apps, most of them free.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Need switches? Buy now, report says
  2. Privacy stink erupts over Borders bankruptcy deal
  3. Lane defends HP decision to name Whitman CEO
  4. Next-gen boot spec could forever lock Linux off Windows 8 PCs
  5. MySQL moves closer to closed
  6. Lync not enterprise-ready, claims Microsoft ISV-turned-rival
  7. Microsoft Hyper-V and Cisco Nexus 1000V: A proverbial win-win
  8. HP board ousts Apotheker, Whitman in as CEO
  9. Open this malware or I'll sue you
  10. Cisco: Is the Internet as important as food, water, air, shelter?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment