Tuesday, July 24, 2012

Civil liberties groups praise revised cybersecurity bill

Gov't surveillance 'unreasonable' & violated the 4th amendment 'at least once' | Black Hat demo: Google Bouncer can be beaten

Network World Security

Forward this to a Friend >>>


Civil liberties groups praise revised cybersecurity bill
Five U.S. senators have introduced a revised version of cybersecurity legislation unveiled earlier this year, with digital liberties groups praising changes that limit the type of cyberthreat information that can be shared between private companies and the U.S. government. Read More


WHITE PAPER: Sourcefire, Inc.

The Sourcefire FireAMP Detection Lattice
Malware defense is a large-scale data analytics problem. If your detection technologies aren't designed to work together to rapidly process and correlate large amounts data, you'll never gain the visibility and control you need to eradicate malicious software. Traditional 'stack-based' frameworks don't work. Learn More

RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant remote support with LogMeIn Rescue
With LogMeIn Rescue, you can start a support session in just 60 seconds. Connect 24/7 to PCs, Macs, smartphones and tablets. You'll get in, solve the problem and save the day without ever leaving your desk. Try it free today.

Gov't surveillance 'unreasonable' & violated the 4th amendment 'at least once'
It's official; the government's spying efforts exceeded the legal limits at least once, meaning it is also "unreasonable under the Fourth Amendment." Read More

Black Hat demo: Google Bouncer can be beaten
Bouncer, the Google technology meant to check Android Market apps for malicious code, can be circumvented, according to a briefing at Black Hat. Read More

Amazon opens up about its cloud security practices, joins CSA registry
Amazon Web Services has shed some light into the security features of its IaaS cloud offering by submitting an entry to the Cloud Security Alliance's Security, Trust and Assurance Registry (STAR). Read More


WHITE PAPER: Ipswitch File Transfer

Best Practices for Business Class File Sharing Solutions
Learn what's driving the need for improvements in business class file sharing & why IT needs to manage file sharing for the organization. Learn More.

Beyond Dropbox: Security is only part of the cloud's problem
Microsoft might want you to "Take it to the Cloud" but a whole lot of people are wishing they had stayed on the ground. The recent news that Dropbox accounts may be exposed, again, to attack should raise alarms for any IT manager considering cloud services. Read More

Hacker Arrested for 2008 DDoS Attacks on Amazon.com
A 25-year-old Russian hacker has been arrested for allegedly orchestrating two denial of service attacks on Amazon.com and eBay in 2008. Read More

Syria disappears from Internet for 40 minutes
Syria's presence on the Internet suddenly went dark for around 40 minutes on July 19, Net analysis firm Renesys has reported. Read More


WHITE PAPER: Sourcefire, Inc.

Sourcefire FireSIGHT: Context-Aware and Adaptive Security
Learn why Context-Aware and Adaptive Security is the key to effective protection today. View Now

Cisco's Roller Coaster July
It seems that so far July 2012 has been a bit of a microcosm of what Cisco has been like the past few years. They've taken huge leaps forward with technology and the potential doors they can open for users, but taken some steps backward in the handling of their business practices. And security might be an issue. Read More

Domestic drones: security and privacy game changer
University of Texas Prof. Todd Humphreys testified to Congress about how his team "repeatedly took control" of a civilian drone from a remote hilltop at White Sands Missile Range in New Mexico in front of Homeland Security and FAA officials. Read More

Black Hat blames phishy email on volunteer's error
A phishy looking email sent over the weekend to attendees of this week's Black Hat security conference turns out to have been an innocent mistake by a volunteer, according to the event organizer. Read More



SLIDESHOWS

9 itsy-bitsy, teeny-weenie computers
Here are eight products, and a project in development, that are leading the effort to make PCs small enough to slip into your pocket.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Office 2013: What we still don't know
  2. iPhone 5 rumor rollup for the week ending July 20
  3. Smartphones of summer: The 12 hottest handhelds
  4. Bitcoin: Seven reasons to be wary
  5. Are firewalls dead?
  6. Microsoft code contains the phrase 'big boobs' ... Yes, really
  7. Earliest known photos of an Apple iPad prototype
  8. EFF: Americans may not realize it, but many are in a face recognition database now
  9. Microsoft employee on stack ranking and its 'most universally hated exec'
  10. Cisco's roller coaster July

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment