Search This Blog

Tuesday, September 13, 2011

Velocihackers and Tyrannosaurus superior

US lacks serious cyber intelligence | Security roundup: How did 9/11 change IT?; Microsoft premature patching; HIPAA gets nasty

Network World Security Strategies

Forward this to a Friend >>>


Velocihackers and Tyrannosaurus superior
In the early 1990s, I used to write for the paper version of Network World. Recently I was watching the 1993 hit movie "Jurassic Park" and I recalled a column I wrote back then that caused a flurry of comment and that may interest current readers. Here's a slightly updated version of that old column. Read More


WHITE PAPER: Quest Software

Practical and Affordable Disaster Recovery
In this Quest white paper by Technology Strategy Research, learn the challenges small and mid-sized business face when implementing virtualization – and how to overcome them. Then get best practices for a strong disaster recovery plan and much more. Read it today. Learn more.

WHITE PAPER: ExtraHop

Application Performance Management
In this eGuide, Network World, with sister publication CIO, offer news on the latest trends, best practices, and straightforward advice on these solutions and the challenges of managing application performance. Learn More!

US lacks serious cyber intelligence
There is an urgent need for businesses and our government to develop high-level cyber intelligence as a way to combat the unacceptable levels of online security threats because the current "patch and pray" system won't cut it in the future. Read More

Security roundup: How did 9/11 change IT?; Microsoft premature patching; HIPAA gets nasty
The 10th anniversary of the infamous Sept. 11, 2001, terrorist attacks on America is prompting reflection on those who died on that day of mass murder, and what changed in our society because of it. Read More

HP's 'Secure Boardroom' gives execs comprehensive view of corporate security posture
HP today unveiled "Secure Boardroom," an online portal where the corporate CEO, CIO and risk officer can be presented with a view of technical and business information related to operational security. Read More


WHITE PAPER: ADTRAN

Unified Communications: Getting the Green Light
In these articles, Network World and its sister IDG Enterprise publications explore the rising importance of UC within the enterprise and provide advice on how to create a working strategy. Learn more

Inside Cisco global security operations
Cisco's Security Intelligence Operations (SIO) provides threat information, vulnerability analysis, and mitigation solutions to enterprise customers. Staff and resources are at work around the world, including at 11 Threat Operations Centers. Network World visited Cisco's TOC in Austin, Texas, for an inside look at how the distributed security teams come together. Read More

GlobalSign plans to reopen Tuesday despite web server hack
GlobalSign expects to bring its certificate-issuing systems back online on Monday, and resume business Tuesday, it said over the weekend. The U.S. certificate authority (CA) stopped issuing new SSL certificates last Tuesday in order to audit its security, after being named as a target by the hacker who claimed to have attacked Dutch CA DigiNotar. Read More

HP introduces new Enterprise security software
Hewett-Packard is expanding its Enterprise Security Solutions portfolio to help businesses deal with persistent security threats from cloud computing and social media. Read More


WHITE PAPER: Kaseya

How to Launch a Successful IT Automation Initiative
In this paper, we'll look at IT automation from the corporation's perspective, and discuss the steps organizations should take before launching such an initiative. We'll hear from companies that successfully implemented computer automation platforms, what their early steps were and what they would do differently if they could repeat the process. Read now

Dome9 launches automated firewall management service
Startup Dome9 Security is introducing automated management of firewall settings on servers in physical and virtual environments with the aim of keeping servers locked down with less manual configuration. Read More

Hacker claims he can exploit Windows Update
The hacker who calls himself "Comodohacker" said this week that he could have used digital certificates stolen from a Dutch firm to issue fake updates to Windows PCs. Read More

Setting the record straight on US, Canadian governments' trusted identity programs
One of last week's newsletters ("Canada is out front once again") caught the attention of folks at the U.S. National Institute for Standards and Technology (NIST), and not in a good way. Read More

Hacker claims he can exploit Windows Update
The hacker who calls himself "Comodohacker" said this week that he could have used digital certificates stolen from a Dutch firm to issue fake updates to Windows PCs. Read More

Warning: HIPAA has teeth and will bite over healthcare privacy blunders
Healthcare organizations that are performing risk assessments as a way to craft patient-privacy policies might want to consider a new potential attack vector: federal regulators. Read More



SLIDESHOWS

What do top CIOs make?
How high can a senior IT leader ascend in the ranks of a public company? High enough to rank among a company's most highly paid executives. High enough to enjoy perks such as company cars, financial planning services, and access to the corporate jet.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. iPhone 5 rumor rollup for the week ending Sept. 9
  2. Inside Cisco's global security operations
  3. How the iPad is changing work, and working together
  4. Want a job? These 10 tech firms are hiring
  5. Verizon fires workers who ran, participated in office football pool
  6. HIPAA has teeth and will bite over healthcare privacy blunders
  7. Which city has the most painful commute in the world?
  8. iPhone at last gets Flash
  9. Woman sentenced for selling counterfeit Cisco equipment
  10. Commercial devices to get military-grade security

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: