Tuesday, September 13, 2011

US lacks serious cyber intelligence

Inside Cisco global security operations | HP's 'Secure Boardroom' gives execs comprehensive view of corporate security posture

Network World Security

Forward this to a Friend >>>


US lacks serious cyber intelligence
There is an urgent need for businesses and our government to develop high-level cyber intelligence as a way to combat the unacceptable levels of online security threats because the current "patch and pray" system won't cut it in the future. Read More


WHITE PAPER: GFI Software

Security Considerations for SMEs
It is never possible to guarantee that a company is totally secure or that a breach will not occur, however implementing the latest tools and providing ongoing, end-user education will minimize those risks and allow companies to focus more on growing their business rather than repairing it. Read now!

WHITE PAPER: Citrix Systems

Focus Network Strategy On User Experience, Not App Delivery
Free Forrester Report helps you understand why network design has to change and how to focus your network strategy on user experience. You'll get insight on business trends driving change and recommendations for maintaining the best user experience when centralizing services, such as virtual desktops. Compliments of Citrix. Read now

Inside Cisco global security operations
Cisco's Security Intelligence Operations (SIO) provides threat information, vulnerability analysis, and mitigation solutions to enterprise customers. Staff and resources are at work around the world, including at 11 Threat Operations Centers. Network World visited Cisco's TOC in Austin, Texas, for an inside look at how the distributed security teams come together. Read More

HP's 'Secure Boardroom' gives execs comprehensive view of corporate security posture
HP today unveiled "Secure Boardroom," an online portal where the corporate CEO, CIO and risk officer can be presented with a view of technical and business information related to operational security. Read More


WHITE PAPER: VeriSign

Best Practices for a Rapidly Changing Threat Landscape
This paper describes how Verisign draws on their success and hands-on engagements with customers in a range of industries to identify a set of best practices that enables organizations to keep pace with DDoS attacks while minimizing impact on business operations. Read Now!

Open Source Security Pioneer Sourcefire Goes Agile
Martin Roesch and the company he founded, Sourcefire are almost legendary in open source security circles. Roesch is the creator of Snort, the open source intrusion detection/prevention system that became the de facto standard for the entire category. Sourcefire was formed to both commercialize and continue Snort as an open source project. Read More

GlobalSign plans to reopen Tuesday despite web server hack
GlobalSign expects to bring its certificate-issuing systems back online on Monday, and resume business Tuesday, it said over the weekend. The U.S. certificate authority (CA) stopped issuing new SSL certificates last Tuesday in order to audit its security, after being named as a target by the hacker who claimed to have attacked Dutch CA DigiNotar. Read More


WHITE PAPER: Citrix

Research—Accelerate Internet Websites and Applications
Gartner report "How to Accelerate Internet Websites and Applications" is a study of three popular website acceleration techniques: network optimization, front-end optimization and edge caching. Read now

HP introduces new Enterprise security software
Hewett-Packard is expanding its Enterprise Security Solutions portfolio to help businesses deal with persistent security threats from cloud computing and social media. Read More

Warning: HIPAA has teeth and will bite over healthcare privacy blunders
Healthcare organizations that are performing risk assessments as a way to craft patient-privacy policies might want to consider a new potential attack vector: federal regulators. Read More

Why I'm ignoring my W7 warning messages and other Microsoft Patch Tuesday news
On Tuesday, Microsoft will release five updates to fix 15 vulnerabilities, none critical, as part of its routine Patch Tuesday security patches. "A welcome break from Microsoft while we deal with the growing SSL Certificate Issues," says Paul Henry, security and forensic analyst for Lumension. He extends a hearty thank you to Microsoft, though in truth Microsoft is following its usual pattern of... Read More



SLIDESHOWS

What do top CIOs make?
How high can a senior IT leader ascend in the ranks of a public company? High enough to rank among a company's most highly paid executives. High enough to enjoy perks such as company cars, financial planning services, and access to the corporate jet.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. iPhone 5 rumor rollup for the week ending Sept. 9
  2. Inside Cisco's global security operations
  3. How the iPad is changing work, and working together
  4. Want a job? These 10 tech firms are hiring
  5. Verizon fires workers who ran, participated in office football pool
  6. HIPAA has teeth and will bite over healthcare privacy blunders
  7. Which city has the most painful commute in the world?
  8. iPhone at last gets Flash
  9. Woman sentenced for selling counterfeit Cisco equipment
  10. Commercial devices to get military-grade security

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment