Search This Blog

Friday, October 21, 2011

FAQ on Son of Stuxnet

By the numbers: The impact of data breaches | Top geeky costumes from around the Web

Network World Compliance

Forward this to a Friend >>>


FAQ on Son of Stuxnet
Duqu is primarily a remote-access Trojan targeted at a limited number of organizations in Europe, Africa and the Middle East to gather intelligence that can help plan a future attack. Read More


WHITE PAPER: Sybase

Bloor Report: Sybase® IQ 15.3 In Detail
Sybase® IQ is well positioned to compete with traditional and appliance vendors. While it has different advantages in dif¬ferent environments, it merits careful review by organisations investigating data warehousing, high-speed analytics and business intelligence options. Read now.

WHITE PAPER: HP

The People Side of Converged Infrastructure
IT is undergoing a massive shift. CIOs are looking for more flexible architectures that will allow them to quickly react to business needs. The Converged Infrastructure delivers the flexibility that CIOs need, with a high level of simplicity and automation that accelerates business outcomes while reducing costs. Read now

By the numbers: The impact of data breaches
Websense 'Security Pros and Cons' survey of 1,000 IT managers confirms that data breaches are widespread. Here's a look at how organizations are responding. Read More

Top geeky costumes from around the Web
Read More

Amazon Silk offers increased security on open Wi-Fi networks
The cloud-based design of Amazon's Silk browser has positive security side effects because it encrypts all traffic between users and websites, especially important when connected over unprotected Wi-Fi networks where session hijacking attacks can occur easily, the company said. Read More


WHITE PAPER: Aruba Networks

The Smart Device Invasion's Network Impact
Can your WLAN handle the influx of employee-owned smartphones and tablets? Aberdeen's expert recommendations will help with tips to: - Protect the network from compromised mobile devices - Automate authentication and authorization - Intelligently control bandwidth allocation to devices and users - Extend content filtering to mobile devices Read now!

Massive SQL injection attack has comprised nearly 200,000 ASP.Net sites
Hackers are in the midst of a massively successful SQL injection attack targeting websites built on Microsoft's ASP.Net platform. About 180,000 pages have been affected so far, security researchers say. Read More

Breach reporting: Now companies have to do it
Consumer advocates as well as many business groups have attempted to get federal laws adopted in the United States that would mandate disclosure of security breaches in which some types of private information about identifiable people are exposed. In spite of the obvious logic of having a national standard, these efforts so far have failed. Read More

Skype Exploits: I know where you are, what you are sharing, and how to best stalk you
While lurking at Wilders Security Forum, I ran across a link to a research paper filled with terrible news for the half-billion registered Skype users. Security researchers have uncovered some really serious security and privacy flaws in Skype that could reveal the identities, locations over time, digital files, and even P2P activity of hundreds of millions of Skype users. In fact it's bad news for... Read More


WHITE PAPER: HP

Reducing Network Complexity
In this white paper you will learn about the challenges associated with conventional switch solutions; the advantages of HP's Intelligent Resilient Framework (IRF), and the very real business benefits that can result from installing HP A-series switches that employ this technology. Read now

Researchers find way to tighten control over mobile device data
For some time now, many security experts have argued that rather than focus efforts on locking down endpoints, the focus needs to be on keeping the data itself secure. Just last week, we covered a number of the findings from the Human Behavior and Security Culture workshop, held by the Tuck School of Business at Dartmouth. Those at the workshop discussed a Hotel California strategy to data protection -- enabling data to be checked out, but to never leave a prescribed area. Read More

Adobe to fix Flash flaw that allows webcam spying
Adobe is working on a fix for a Flash Player vulnerability that can be exploited via clickjacking techniques to turn on people's webcams or microphones without their knowledge. Read More

Red Lambda Aims To Tackle Big Data Security
I have been writing recently a lot about the hot "Big Data" space. Whether it be Hadoop, NoSQL, scaled storage or similar technologies they all deal with managing and using massive amounts of data that dwarf anything we have seen before. Many of them use commodity hardware and distributed systems to handle this data. But all of this big data creates another problem. Securing big data is a task that... Read More



SLIDESHOWS

2011 tech industry graveyard
Fortunately for the tech industry, there's a lot more living than dying, with 2011 seeing the birth of everything from Apple's iPad 2 to the Google+ social network. But inevitably, 2011 has also seen its share of dead, killed, murdered, offed, obliterated companies, technologies and ideas as well. Here's your chance to pay last respects, and who knows, maybe a few of these will sprout back to life.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Cheap power: An overnight revolution
  2. 'You have to be masochist to be an IT person': FedEx CIO
  3. Android smartphone smackdown: Droid Razr vs. Galaxy Nexus
  4. Gartner: 16 long-held IT business practices you need to kill
  5. Gartner: The top 10 strategic technology trends for 2012
  6. Gartner: 10 key IT trends for 2012
  7. SQL injection attack has compromised nearly 200,000 ASP.Net sites
  8. Day 1: Giving up Windows 7 for Ubuntu 11.10 for two weeks
  9. OpenFlow and SDN: Networking's future?
  10. BlackBerry losing sway in enterprise, study finds

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: