Thursday, August 23, 2012

New BIOS security standards aimed at fighting rootkit attacks

Want security, privacy? Turn off that smartphone, tablet GPS | Information Security: A Sobering Topic at VMworld

Network World Security

Forward this to a Friend >>>


New BIOS security standards aimed at fighting rootkit attacks
There's a growing threat of attacks on computer basic input/output system (BIOS) firmware, and to deter it, the National Institute of Standards and Technology (NIST) is putting in place new security guidelines for updating the BIOS. And in doing this, NIST is getting high-tech manufacturing to raise the bar on security. Read More


WEBCAST: CDW & Symantec

Symantec is Data Loss Prevention
This video documents the importance of data loss prevention solutions. It touches upon the negative effects data breaches have on companies and how unified DLP solutions from Symantec can help locate confidential data, how this data is being used, and how to prevent its loss. Learn More.

WHITE PAPER: Good Technology

Data Loss Prevention eBook: Beyond Mobile Device Management
Critical business data, intellectual property, and sensitive information are spread throughout your organization on servers and desktops they're also being transmitted to smartphones and tablets. Learn how to go beyond device control to manage mobile apps and user interactions. Read Now!

Want security, privacy? Turn off that smartphone, tablet GPS
People with smartphones and tablets may be giving Apple and Android apps they download the permission to capture their geolocation data to know where they are, but security experts are making the strong argument to just say no instead -- and turn off that GPS function unless really needed. Read More

Information Security: A Sobering Topic at VMworld
The technology industry is about to come together next week for VMworld in San Francisco. In the span of a few short years, this show has become a real showcase of the latest and greatest IT technology and industry vision. At VMware, every company wants its IT department to look like Amazon, Google or Zynga, running applications on fully-automated and orchestrated cloud computing platforms, and easily... Read More


WHITE PAPER: Good Technology

Data Loss Prevention Whitepaper: When MDM Isn't Enough
This paper explores common methods of data loss that cannot be prevented through MDM alone. In addition, this paper will introduce Good for Enterprise and its unique approach to managing security on mobile devices, which does address some of the shortcomings of an MDM-only strategy Learn More Now!

Groups lodge FTC complaints over children's online privacy
A coalition of 17 advocacy groups filed complaints on Wednesday with the U.S. Federal Trade Commission against five prominent companies, including McDonald's, claiming that certain of their online marketing practices violate child privacy laws. Read More

After a hack: The process of restoring once-lost data
Mat Honan, a reporter with Wired magazine, thought almost his entire digital life had been lost, but a team of recovery engineers were able to restore most of it by diving deep into his compromised laptop. Here's how they did it. Read More


WHITE PAPER: Array Networks

Secure Your Business.
Employees want to work anytime, anywhere, often from personal and mobile devices. See what Frost & Sullivan has to say about the risk of relying on VPNs and learn about zero-trust models that keep devices "off-network" and prevent data from leaving the network. Learn more.

Dumbest & craziest sports technology moments of 2012
From phony websites to regrettable tweets to Apple Siri chatter, it's clear athletes and technology often don't mix well Read More

Class of 2016: Born of cyberspace; no need for TV, CDs or airline tickets but cannot miss "The Daily Show"
In one of the more interesting annual measurement of society the Beloit College Mindset List offers a snapshot of what the entering college class of 2016 likes and dislikes. Read More

Mark Zuckerberg praises mobile app, accidentally brings down small company's website
At 10:31 p.m. on Sunday evening, Mark Zuckerberg updated his Facebook status. He was grilling a steak, and noticed that the iOS app he was using to monitor the meat's temperature had integrated Facebook to inform users' Friends what they were cooking. Having become excited by the discovery that the site he founded had organically popped up in a product he was using, he wanted to inform his 15.5 million... Read More

Cloud provider: The best security for your passwords is to never give them to us
Ethan Oberman, CEO of cloud backup and sharing service SpiderOak, has a proposition for enterprises that may be leery about using the cloud because of a perceived lack of security. The best security for cloud storage, he says, is to encrypt the data and not give your service provider the keys to unencrypt it. Read More



SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. McAfee antivirus update causes problems for home and enterprise customers
  2. Want security, privacy? Turn off that smartphone, tablet GPS
  3. US to drive 3,000 Wi-Fi linked vehicles in massive crash avoidance trial
  4. Microsoft warns of 'man-in-the-middle' VPN password hack
  5. Mark Zuckerberg praises mobile app, accidentally brings down small company's website
  6. Obama and Romney election apps suck up personal data, research finds
  7. Mobile users prefer Wi-Fi over cellular for lower cost, speed, reliability
  8. Crisis malware infects VMware virtual machines, researchers say
  9. Cisco, SDNs, and CDNs
  10. iPhone parody video: Latest smartphone is ... a camera

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment