Monday, November 07, 2011

Security roundup for Nov. 4: virtualization is key to public cloud security; China, Russia accused of cyber-espionage; More Duqu for you

E-wallet vs. traditional wallet: Electronics trump the leather | Private cloud vs. public cloud vs. hybrid cloud

Network World Security

Forward this to a Friend >>>


Security roundup for Nov. 4: virtualization is key to public cloud security; China, Russia accused of cyber-espionage; More Duqu for you
Ever been in an argumentative mood? Well, last week we were, with editors here coming up with 33 red-hot arguments, such as open source vs. proprietary, or which browser is better. Read More


WHITE PAPER: Citrix

Best Practices for Implementing 2048-bit SSL
Ready for 2048-bit SSL? Not with F5. Shift to Citrix NetScaler. 2x faster 2048-bit SSL performance. Download the Citrix and Verisign 2048-bit Performance Kit. Learn more

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn More!

E-wallet vs. traditional wallet: Electronics trump the leather
Will the day come when you will routinely leave the house every day without your leather or faux-leather wallet? You bet, at least for many folks. Read More

Private cloud vs. public cloud vs. hybrid cloud
There's no denying it: practically every business is moving to the cloud or at least thinking about it. But with a number of options available to them, many are still experimenting with which works best. Read More

The 33 hottest tech arguments
Network World and IDG News Service have assembled this collection of primers examining today's most explosive and intriguing networking and IT issues, from vendor rivalries to product battles to technology trends. Read More


WHITE PAPER: Trend Micro

Protect Virtual Desktops
Protecting virtual servers, virtual desktops and data stored in the cloud requires security optimized for the unique characteristics of these environments. See Tolly Enteprises' Independent performance tests comparing the performance of Trend Micro, McAfee, and Symantec. Read Now

Clouds of anxiety: Companies worry about security of cloud computing
While organizations continue to embrace cloud-computing platforms, surveys find organizations are concerned about security and their very ability to manage it in the cloud. Read More

Hacker selling access to compromised websites gets hacked
A hacking group called d33ds broke into the online shop of a rival hacker who sells unauthorized access to high-profile websites and data. Read More

Duqu exploits same Windows font engine patched last month, Microsoft confirms
Microsoft on Thursday confirmed that the Windows kernel vulnerability exploited by the Duqu Trojan is within the TrueType parsing engine, the same component it last patched just last month. Read More


WHITE PAPER: BMC

How to Choose a SaaS-Based I.T. Service Management Solution
All SaaS help-desks are not created equally. From basic ticket logging to full-featured, enterprise-grade service management solutions, there truly is something for everyone. Learn more about the key factors in deciding between a comprehensive or a slimmer selection for your organization. Learn More Today!

Dome9 centrally manages cloud server firewalls
Many companies are hesitant to adopt hosted solutions or cloud computing because of security fears. One of the biggest areas of vulnerability is also the first line of defense: the host firewall. Administrators leave ports open so they can access their servers and applications for routine operations and maintenance. Dome9 provides a SaaS solution aimed at controlling and monitoring those ports to reduce vulnerabilities. Read More

Security Professionals Believe That APTs Represent A Threat To U.S. Vital Interests
One of the objectives of the ESG Research Report, "U.S. Advanced Persistent Threat Analysis," was to gauge what security professionals thought. Was "APT" nothing more than a marketing term? Did security professionals really believe that APTs are dangerous? To make sure that security respondents were on the same page, we presented them with the NIST definition of APT for starters. Respondents had... Read More

Duqu Malware Exploits Windows Zero-Day Kernel Bug, Attacks Via Microsoft Word Document
Microsoft is up to its neck in muddy malware waters over the Stuxnet-like Duqu Trojan that attacks via a malformed Word document, having admitted yesterday that attackers exploited a previously unknown Windows kernel bug. While there is no definitive workaround right now, Microsoft is "working diligently to address this issue." Read More

Alabama Sheriff Demands Go Daddy Kill AntiSec Hackers' Websites for Data Dumps
Today several lawsuits and news stories about intelligence gathering, surveillance, law enforcement or civil liberties caught my privacy and security-angled eyes as either noteworthy or ludicrous. Alabama law enforcement is breathing down Go Daddy's neck with an injunction for not removing AntiSec and Anonymous data dumps containing personal info of police personnel; Homeland Security will hunt for... Read More



SLIDESHOWS

Security Industry All-Stars
Welcome to the Security All-Stars! Here we have assembled our list of top players in information security who year after year demonstrate the specialized skills that make them worth listening to.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Virtualization holds a key to public-cloud security
  2. Fabric wars: Cisco vs. Brocade vs. Juniper
  3. Bloodiest tech industry layoffs of 2011
  4. Gartner: 10 key IT trends for 2012
  5. AOL discontinues LISTSERV mailing list service
  6. Network World's 33 hottest tech arguments
  7. Cisco vs. HP vs. IBM vs. Dell
  8. Stallman parody site catches Stallman's attention
  9. Surprise! Windows Phone gaining traction
  10. IT pros staying put, expecting raises

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment