Wednesday, November 23, 2011

DARPA to banish “geeky, formal” way code defects are eradicated

Android's Success Makes It a Malware Magnet | Analytics Help Police Stop Crime Before it Happens

Network World Security

Forward this to a Friend >>>


DARPA to banish "geeky, formal" way code defects are eradicated
For every 1,000 lines of code, one to five bugs are introduced. And getting those bugs out of the millions of lines of software code that run today's complex systems is costly and only performed by highly specialized researchers with deep knowledge of software and mathematical theorem-proving techniques. Read More


WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn More!

Android's Success Makes It a Malware Magnet
Since July there has been a 472 percent increase in spyware and viruses targeting Android. It's popularity and open system attract hackers who make problems for enterprise mobile security efforts. Read More

Analytics Help Police Stop Crime Before it Happens
Two California cities are pioneers in "predictive policing." Analysis of historical crime data produces digital maps that show officers where to patrol to prevent burglaries and vehicle thefts. Read More

Browser extension allows users to express their email privacy expectations
A team of privacy researchers and product designers from Europe and the U.S. have released a browser-based implementation of Privicons, a project that aims to provide users with a simple method of expressing their expectations of privacy when sending email. Read More


WHITE PAPER: i365

Trusted Data Assurance in the Cloud
Cloud-based services are here to stay. Cloud services are even more attractive for companies who are being hit with the high cost of meeting compliance requirements - especially for small and mid-size companies that have shrinking or no information security budget. Read now!

Illinois water authority hack: Threat has been looming for years
While nobody's willing to say whether a burned out pump at an Illinois water authority is the result of a cyberattack, the big issue remains that nobody can say that it wasn't, according to experts. Read More

FAQ: What you should know about Illinois water-district SCADA breach
Here are some key questions and answers about the Nov. 8 break-in of the control network at an Illinois water utility that resulted in attackers burning out a pump. Read More

Nine successful, effective IT project tips
Most often when the watchdogs at the Government Accountability Office are called into to check out an agency, process or project they are looking for something that has gone wrong. This week, however the group took a look at some government IT projects that have gone right and came up with some best practices other government agencies or in public corporations could emulate to achieve success in... Read More


WHITE PAPER: Dell

Mobility KnowledgeVault
The resources in this Mobility KnowledgeVault provide expert guidance, peer advice, survey results and best practices to help you protect your mobile infrastructure. From determining a policy for employee-owned devices and data encryption to supporting the six major mobile operating systems, securing mobile devices and data is a top priority. View now

The Need for Cloud Identity Management
Imagine this scenario: a disgruntled IT staffer leaves the company, goes down to the local McDonald's, logs back into the network and starts taking down virtual machines. One of the machines taken down is the Exchange server, virtually killing much of the internal response due to reliance on email as a major response coordination mechanism. Sound far-fetched? Well, it happened in August to the U.S.... Read More

EFF proposes new method to strengthen Public Key Infrastructure
The Electronic Frontier Foundation (EFF) is proposing an extension to the current SSL chain of trust that aims to improve the security of HTTPS and other secure communication protocols. Read More

Face Unlock feature in Galaxy Nexus seen as novelty, not security
Face Unlock, the facial recognition software offered in Android 4.0 on the Galaxy Nexus, is being promoted by Google as an alternative to using a PIN to unlock a phone. But it can apparently be spoofed. Read More



SLIDESHOWS

Top IT Turkeys of 2011
You know, it just doesn't feel like Thanksgiving to me unless I have mashed potatoes, pumpkin pie, and an iPad with the annual Network World Top IT Turkeys slideshow all arranged on the table for the feast. So let's sharpen our knives and get to the carving, because these turkeys are getting cold.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Interview with a pirate
  2. Apple prepping iPhone 5 with 4-inch screen in 2012
  3. How to get your kid into an elite computer science program
  4. 11 eye-popping Black Friday tablet, laptop and ereader deals
  5. Top IT turkeys of 2011
  6. The Dirty Dozen of security vulnerable smartphones
  7. MalCon: Malware hacking conference for twisted pen testers
  8. Hottest major on campus? Computer science
  9. Gunman barricades himself inside Air Force's GPS satellite control facility
  10. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment