Thursday, March 22, 2012

US Cyber Chief: We are fighting a “tide of criminality”

  Most fraud against businesses from bad checks, not electronic payments | Cisco offers virtualized video surveillance
 
  Network World Security

Forward this to a Friend >>>


US Cyber Chief: We are fighting a "tide of criminality"
What the government is doing and how much money it is spending to protect cyberspace was again the subject of a congressional hearing this week as top execs in the Department of Defense detailed what they would be doing with the $3.4 billion cyber security portion of their 2013 budget request. Read More


WEBCAST: Bradford Networks

IT Consumerization and BYOD, A Blueprint for Success
IT leaders must embrace BYOD, but the key to success lies in blueprint—protection for both the device and the network. This lively discussion with Bradford Networks explores everything, from the challenges and the benefits to prescriptive direction for securely tackling BYOD. Learn More

WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

Most fraud against businesses from bad checks, not electronic payments
When it comes to financial fraud against businesses, it's old-fashioned paper checks that wreak more monetary damage than fraud committed through electronic payments, such as debit/credit, corporate cards, or Automated Clearinghouse (ACH) payments. Read More

Cisco offers virtualized video surveillance
Cisco today announced a virtualized version of its Video Surveillance software for use on its Unified Computing System platform for enterprise- or government-operated video-camera deployments. Read More

Ex-NASA scientist, MIT grad gets 13 years in prison for espionage, fraud
Ex-NASA worker, planetary scientist and physicist, Stewart Nozette was today sentenced to 13 years in prison for attempted espionage, conspiracy to defraud the United States and tax evasion. Read More


WHITE PAPER: SuccessFactors

Beyond Simple Total Cost of Ownership
When considering new applications, the question has always been "Build or Buy?" But increasingly today, it's "Buy or Rent?" In this paper, we analyze the implications and costs of purchasing and implementing cloud-based software (SaaS) vs. traditional on-premise software. Get your copy now, compliments of SuccessFactors. Learn More Now!

Ransomware: The Latest Trend in Malware
If the software industry showed as much innovation and initiative as the malware business, we might have some really nice software to choose from. But for now, the bad guys are one step ahead of the rest of us, with a new way to squeeze money out of your pocket. Read More

Cloud security registry slow to catch on
Last August the Cloud Security Alliance (CSA) announced at the Black Hat security conference in Las Vegas a registry that it hoped would serve as a place for prospective cloud users to go to easily inspect and compare cloud vendors' security controls. But to date, only three companies have submitted their cloud security data, making the registry of limited use. Read More

Mystery programming language in Duqu revealed
Last week, we highlighted the peculiarity of Duqu, a piece of malware security experts believe was coded by the same people who developed Stuxnet, the famed trojan which took measures to disrupt Iran's nuclear weapons program. Read More


WHITE PAPER: Oracle

Sustainable Compliance for the Payment Card Industry
This white paper explains the essentials of a PCI DSS compliance program, focusing on the critical but problematic areas that comprise much of the heart of the requirements. Learn More!

LulzSec is back; Anonymous targets Imperva
Hacker collective LulzSec, six of whose members were arrested earlier this month, will resume active operation April 1, according to a video posted on YouTube. Read More

Researchers find new type of 'fileless' malware
Researchers have discovered an extremely rare and possibly unique form of "fileless" malware that executes entirely in memory without the need to save any files to the hard drive of a victim's PC. Read More

Security Card Access Methods: The "butt bump"
NetBuzz author Paul McNamara and other IDG Enterprise editors demonstrate the security card access method known (around here, at least) as "the butt bump" Read More

Firefox to turn on default encryption for all Google searches
Mozilla is currently testing default encrypted Google searches for all Firefox users, with the intent to make all Google searches encrypted in the near future, the browser maker said on Wednesday. Read More

China names Japan and US as top cyberattackers
China is on the receiving end of a growing volume of cyberattacks with Japan and the US the biggest culprits, the country's National Computer Network Emergency Response Technical Team (CNCERT/CC) has announced. Read More

 
 
 

SLIDESHOWS

Review: Android-based Wi-Fi stumblers
Four easy-to-use wireless management and security tools that cost under $2.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Cisco helps users welcome BYOD
  2. Which smartphone apps are the biggest data hogs?
  3. LulzSec is back; Anonymous targets Imperva
  4. 11 promising enterprise social networks
  5. Apple denies new iPad overheating issues
  6. New iPad sales already top 3 million
  7. 'Surprise' Mac app quickly configures iOS devices
  8. Developer interest in Android slowly eroding, survey finds
  9. 9 classic computers that you can run on your Android device
  10. DARPA wants the ultimate technology, sensor network to monitor vast Arctic
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment