Search This Blog

Friday, September 02, 2011

US Dept. of Energy devises security system to thwart rampant copper thefts

Mac OS X can't properly revoke dodgy digital certificates | VMware strives to expand security partner ecosystem

Network World Security

Forward this to a Friend >>>


US Dept. of Energy devises security system to thwart rampant copper thefts
The US Department of Energy and its Oak Ridge National Laboratory has built a security system that is aimed at thwarting at least some of the copper thefts that plague utilities and other large facilities. Read More


WHITE PAPER: GFI Software

Social Networking and Security Risks
Each social networking tool comes with its own set of security concerns which can put your information systems and/or personal data at risk. This white paper will look at some of these risks and identify possible solutions to help protect you, your personal information and your company data. Read now!

WHITE PAPER: Akamai Technologies, Inc.

Akamai Cloud Optimization for Amazon EC2™
The emergence of public cloud platforms and services has IT organizations thinking about which applications they want to keep in-house and which they can build within the cloud. Read more

Mac OS X can't properly revoke dodgy digital certificates
A programming glitch in Apple's OS X operating system is making it hard for Mac users to tell their computers not to trust digital certificates, exacerbating an ongoing security problem with a Dutch certificate authority that was recently hacked. Read More

VMware strives to expand security partner ecosystem
VMware yesterday said it has added more security vendor partners to its vShield product-development program in which security firms work with the company to develop data protection specifically designed for VMware's flagship virtualization platform, which today is vSphere 5.0. Read More

Chatbots gone wild – and nasty
A demo of two robots chatting that a pair of Cornell University Ph.D. students cobbled together for an artificial intelligence course has exploded into a viral video over the past week that has amassed nearly 1.4 million views on YouTube. The video, "AI vs. AI. Two chatbots talking to each other" (see below) is based on a Web-based chatbot called Cleverbot that the students gussied up with a text-to-speech... Read More


WHITE PAPER: Fujitsu

A New Look at Energy-Efficient Servers
The family of PRIMERGY® Intel® Architecturebased servers offers a wide range of capacities, performance, and configurations to fit almost any application service requirements. Read now!

The big, bad browser quiz
Internet Explorer, Firefox, Chrome, Safari -- you know the names of these Web browsers, but do you really know them? Read More

Information assurance must adapt to changing technology
The new semester has begun at Norwich University and we've had a couple of class sessions for the IS340 Introduction to Information Assurance course. One of the changes I've made in the last year is that I no longer inflict death by PowerPoint on my students; instead of pontificating at them, I just distribute printouts of the lectures (six slides per page), make the PDF and PPTX versions of the slides available to the students through a folder on the course Web site and guide the students in vigorous discussion in every class meeting. We also use a learning platform (an implementation of Moodle) for online discussions, some tests, and submission of assignments. Read More

Hackers may have stolen over 200 SSL certificates
Hackers may have obtained more than 200 digital certificates from a Dutch company after breaking into its network, including ones for Mozilla, Yahoo and the Tor project, a security researcher reported today. Read More


WHITE PAPER: ADTRAN

Adopting Unified Communications: Key Steps to Consider
The faster your business can locate, gather and share information, the more productive and competitive you can be. That's why small and medium enterprises are upgrading to a unified communications (UC) system, which can improve customer service, streamline product development and speed response to new opportunities. Learn more. >>

Tips for Taming Rogue IT
Sure, some rogue IT is the result of unmet technology needs. Other times, it's just the product of misunderstanding or miscommunication. Read More

Hackers break into Linux source code site
As Linux fans know, there are two kinds of hackers: the good guys who develop free software, such as the Linux kernel, and the bad guys who break into computers. Read More

Agency to deliver shared governance, risk compliance service
CenITex, the Victorian Government's shared services IT agency, will adopt a new IT governance, risk and compliance (ITGRC) package to improve its information security function. Read More

Desktop virtualization users say the technology brings challenges
Sacking the old PC in favor of desktop virtualization is starting to grow and the information technology managers taking the lead on that trend offered some perspectives on the networking and security challenges it brings. Read More

WikiLeaks cable: Apple slow to counter Chinese fakes
Apple did not have a global security team, including in China, until March, 2008, when it hired employees from drug company Pfizer, to counter rampant counterfeiting of its products in China, according to a cable leaked by activist group, WikiLeaks. Read More



SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. Thinnest material in the world could boost Internet speeds tenfold-plus
  2. Microsoft's 5 biggest weaknesses
  3. Apple reportedly on another lost iPhone scavenger hunt
  4. 'You are an idiot' if you don't give back to open source
  5. Feds move to block AT&T-T-Mobile merger
  6. Microsoft claims its private cloud is up to four times cheaper than VMware's
  7. Will climate engineering ever be ready for prime time?
  8. 4 simple steps to bulletproof laptop security
  9. Cisco, VMware expand collaboration
  10. Hackers break into Linux source code site

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: