Tuesday, September 27, 2011

US senator wants FTC to put heat on "brazen" OnStar for privacy changes

Securing Your Internet Infrastructure is Securing Your Enterprise | Is Quantum Computing real?

Network World Security

Forward this to a Friend >>>


US senator wants FTC to put heat on "brazen" OnStar for privacy changes
US Senator Charles Schumer (D-NY) sent a letter to the Federal Trade Commission to get the agency to investigate recent changes made to navigation and emergency services company OnStar made to its privacy practices. Read More


WHITE PAPER: Lumension

Endpoint Security: Winning the Endgame
Sophisticated malware is proliferating, especially at the endpoints that connect your environment to the rest of the world. Here's what you need to know about protecting your PCs, laptops and other endpoints in the new security arms race. Read More!

WHITE PAPER: VeriSign

Approaches to DDoS Protection - A Cost Analysis
All organizations with an online presence or dependence on Internet-based systems need to fortify their defenses against DDoS attacks. Read this paper to learn what an attack can cost an organization, how to develop a DDoS mitigation strategy, and how to get maximum protection from your investment. Read Now!

Securing Your Internet Infrastructure is Securing Your Enterprise
The virtualizing enterprise is characterized by its embrace of data center and desktop virtualization, mobility, and unified communications, and by its complete integration of the Internet into the infrastructure — to connect to its customers, its partners, and its own users. As always, business lines, end users, customers, and partners demand more (and more reliable and better performing) services... Read More

Is Quantum Computing real?
Researchers have been working on quantum systems for more than a decade, in the hopes of developing super-tiny, super-powerful computers. And while there is still plenty of excitement surrounding quantum computing, significant roadblocks are causing some to question whether quantum computing will ever make it out of the lab. Read More

Top 10 banned books of 2010
The American Library Association this week observing its 13th annual Banned Book Week where it takes a look at censorship and all manner of literary issues. The ALA says the Banned Books list was started in 1982 as a "response to a sudden surge in the number of challenges to books in schools, bookstores and libraries." Read More


WHITE PAPER: CenturyLink Business

Manage Complexity, Cost and Compliance
To outsource or not to outsource IT security—that is the question for enterprises as they face increasingly complex cyber threats. Managed security services can help organizations alleviate the cost and complexity of proactively securing the IT infrastructure. Read Now.

Some W8 PCs won't turn off secure boot, Red Hat warns
Last week, I alerted readers how Microsoft was requiring OEMs to implement, by default, UEFI secure boot on new Windows 8 machines. The Linux community had been worried for months that secure boot could lock Linux off PC hardware and when Microsoft announced that secure boot would be required by all new Windows 8 hardware the red flags flew. Read More

Concern over U.S. snoops drives Canadian political party to cloud-based encryption
One of Canada's largest political parties is using cloud-based Salesforce.com in the U.S. to store information about voters and interact with them, but worries that U.S. government snoops could peek at sensitive information under U.S. law prompted the Canadian party to use a strong encryption approach. Read More

Splunk explains it all
If there's gold in log files, Splunk, Inc's Splunk will help you to find it. Splunk bridges the gap between simple log management and security information and event management (SIEM) products from vendors such as ArcSight, RSA, Q1 Labs, and Symantec. Read More


WEBCAST: IBM

Using IBM Tivoli Security Management for z/OS
Administration can be a complex world where security is concerned. The resources spent on administration, management, auditing and compliance can be considerable. Watch the demo, "Using IBM Tivoli Security Management for z/OS," and see how IBM® can help you protect your business—simply, efficiently and more effectively. Learn More

NSA Label-based System Could Secure Big Data
The National Security Agency has submitted Accumulo, its label-based, data-store software, to the Apache Software Foundation so that other parties can further develop the technology for use in secure systems. Read More

5 more dirty tricks: Social engineers' latest pick-up lines
You may now be savvy enough to know that when a friend reaches out on Facebook and says they've been mugged in London and are in desperate need of cash, that it's a scam. But social engineers, the criminals that pull off these kinds of ploys by trying to trick you, are one step ahead. Read More

Gang of Zeus-driven bank thieves put out of business
A mid-level organizer of an international online bank-theft ring that relied on the Zeus Trojan faces up to 45 years in prison when he is sentenced Jan. 13 after pleading guilty to conspiracy to commit bank fraud and possession of false IDs. Read More

Defense against dark arts: Multidisciplinary security quiz
1. Barbican Read More



SLIDESHOWS

Geekiest cupcake designs
From mainstream iPhone and Google icons to geeky Ubuntu and Big Blue logos, cupcake bakers have taken inspiration from technology for their complex fondant-and-frosting structures. Here are some of our photogenic favorites.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Is quantum computing real?
  2. Software upgrades could produce self-tuning wireless access points
  3. iPhone 5 rumor roll-up for the week ending Sept. 23
  4. iPhone 5 doesn't appear T-Mobile bound
  5. Need switches? Buy now, report says
  6. Splunk explains it all
  7. Cisco 6500 series: Retired veteran or re-discovered super soldier?
  8. Facebook's Timeline will be boon for hackers
  9. vSphere 5 sets the virtualization bar
  10. Cisco, Microsoft cooperation on virtual switching gives customers new option

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment