Search This Blog

Monday, September 19, 2011

US Energy Dept. finds myriad challenges to building culture of network security

Security roundup: Stealing from the military; persistent threats; mammoth security problems; bot armies | FTC plans changes in online child privacy protection rules

Network World Security

Forward this to a Friend >>>


US Energy Dept. finds myriad challenges to building culture of network security
When it comes to securing the nation's critical energy networks, the Department of Energy says much work remains. Key to that work are the engineers, network administrators, vendors and others behind the security technology -- but they will be leaving the industry in droves in the next five years, according to a Department of Energy security roadmap issued this week. Read More


WHITE PAPER: EdgeWave

Beyond Spam: Next-Generation Email Security
Get a first-hand look at EdgeWave's next-generation technology with services that include Email Security, Email Continuity, Data Loss Protection, Encryption and secure Archive. Register now for this live product demonstration and get immediate access to the complimentary white paper: Beyond Spam - Email Security in the Age of Blended Threats. Read now.

WHITE PAPER: Diskeeper Corporation

The Efficiency Essentials You're Dead Without
This white paper takes you inside Diskeeper 2011 and clearly shows you why you shouldn't run your network without it. Learn more.

Security roundup: Stealing from the military; persistent threats; mammoth security problems; bot armies
Sometimes the difference between selfless valor and selfish cowardice is stark. On the same week that 21-year-old Marine Sgt. Dakota Meyer is awarded the Medal of Honor for heroism in saving his compatriots in Afghanistan, we hear that Rene Quimby, 42, is sentenced to prison for stealing 16,000 identities of U.S. military service members and using that information to steal from 650 victims. Read More

FTC plans changes in online child privacy protection rules
The U.S. Federal Trade Commission has proposed amendments to online privacy rules for children that aim to give parents control over what personal information websites may collect from children under 13. Read More


WHITE PAPER: VeriSign

Approaches to DDoS Protection - A Cost Analysis
All organizations with an online presence or dependence on Internet-based systems need to fortify their defenses against DDoS attacks. Read this paper to learn what an attack can cost an organization, how to develop a DDoS mitigation strategy, and how to get maximum protection from your investment. Read Now!

Cybersecurity Solution for Anonymous: Hire Hackers vs. 20 Years Jail Time?
I've always thought hackers could save the world if they chose to, so a post on MSDN blogs my eye. I stopped on Terry Zink's Cyber Security Blog and watched the TED video, Hire the hackers! Read More

Man stole data from U.S. service members via P2P
A California man who dug up sensitive information belonging to U.S. service members on peer-to-peer networks, and then used it to order iPods, cameras, and even washing machines from an online store, was sentenced to 75 months in federal prison Thursday. Read More


WHITE PAPER: Quest Software

5 Tips for Effective Backup & Recovery
In this Quest white paper, discover proven techniques to maximize and secure your virtual investments. Learn to increase backup speed, maximize throughput, and minimize performance drains while reducing costs. Read the white paper today. Read More.

Oracle: Security flaw could bring down app servers
Oracle has issued an emergency patch to fix a vulnerability it says could bring down HTTP application servers it sells that are based on Apache 2.0 or 2.2. Read More

Nigeria tries to quash rumor of "killer" cell phone number
Talk about going extremely viral. Reports today from a number of outlets has Nigerian officials trying to quell public concern that by answering a certain phone number, cell phone users are killed. Read More

Bot army being assembled, awaiting orders
A mammoth army of infected computers is being assembled, but it's unclear yet what purpose they will be put to. Read More

Cyber-attack: A big one is coming says US Cyber Command General
It's not the first time we've heard this but it's always a little disconcerting especially from some one so closely involved with the security realm: A destructive attack from cyberspace "is coming, in my opinion. It is a question of time. What we don't know is how far out it is," and whether it will target commercial infrastructure, government networks or mobile platforms Army Gen. Read More



SLIDESHOWS

Cloud companies to watch: A product sampler
Our Cloud Companies to Watch story gives you the lowdown on a handful of startups looking to make their mark in a business so far dominated by the likes of Amazon, Google, Rackspace and VMware. Here's a closer look at some of the products and services being rolled out by these newcomers.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. Buzzblog: Blue screen of death gets a new look in Windows 8
  2. Has Google's CEO stopped using Google+?
  3. Enterprise WAN connectivity: MPLS VPN vs. Public Internet
  4. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
  5. Bot army being assembled, awaiting orders
  6. Facebook's new friend lists: 5 things you need to know
  7. Stevie Wonder thanks Steve Jobs for making the iPhone and iPad so accessible
  8. Survey ranks best IT departments in financial services
  9. Windows Server 8: The Microsoft server fork
  10. Server 8 benefits from lessons learned with Azure

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: