Monday, August 13, 2012

Obama weighs executive order on cybersecurity

Former Goldman Sachs coder, freed on appeal, faces new charges | Security experts push free Gauss detection tools

Network World Security

Forward this to a Friend >>>


Obama weighs executive order on cybersecurity
President Barack Obama is signaling that if Congress won't act on cybersecurity legislation, he will implement the elements he considers essential by executive order. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant remote support with LogMeIn Rescue
With LogMeIn Rescue, you can start a support session in just 60 seconds. Connect 24/7 to PCs, Macs, smartphones and tablets. You'll get in, solve the problem and save the day without ever leaving your desk. Try it free today.

WHITE PAPER: Blue Coat Systems

Optimize and Secure Cloud, SaaS, BYOD, and Social Media
Today's threat landscape has migrated to the web causing many security professionals to prevent direct Internet access at the branch. But with new cloud-based security solutions from Blue Coat you can re-architect your network to embrace the Internet – safely – and optimize application performance. Learn more.

Former Goldman Sachs coder, freed on appeal, faces new charges
A former programmer for Goldman Sachs has been charged again with pilfering sensitive source code despite his successful appeal in April of his U.S. Federal Court trial outcome. Read More

Security experts push free Gauss detection tools
Two security organizations have released online tools that let Windows users check for possible infections by Gauss, the newly-revealed cyber surveillance malware thought to have been government- built. Read More


WHITE PAPER: SafeNet Inc

Compliance Assurance for Virtual and Cloud Environments
When implementing virtual or cloud-based services, organizations that need to ensure ongoing compliance must address several key requirements before they can migrate sensitive data. ProtectV is designed to provide data protection and auditable compliance for all mandated regulations. Learn More

'Gauss' cyberweapon targeting Middle-Eastern banks, says Kaspersky Lab
Cybersleuths at Kaspersky Lab have announced the unmasking of yet another apparently state-sponsored cyber-weapon dubbed 'Gauss' which appears to be attacking banks and individuals in a number of Middle-Eastern countries but not, for once, the usual target, Iran. Read More

Blizzard Entertainment warns of password breach
Blizzard Entertainment, maker of popular multiplayer online games such as World of Warcraft, Diablo and Starcraft, warned on Thursday that its internal network was breached, revealing scrambled passwords and email addresses. Read More


WHITE PAPER: Riverbed

CIO's Guide to Advanced Consolidation
Consolidating IT infrastructures is a continuing trend, particularly in an uncertain economy with organizations looking to reduce costs. Learn more.

Microsoft & NYPD launch an all-seeing Big Brother crime & terrorism prevention system
It's well known that Microsoft has a good relationship with law enforcement and intelligence agencies. It also has developed Public Safety & National Security Solutions. "Microsoft has quietly become one of the world's largest providers of integrated intelligence solutions for police departments and security agencies," Fast Company reported. Read More

Recent cloud critics, including Wozniak, intensify debate
Cloud computing has taken some heat this week. First, over the weekend Apple co-founder and tech icon Steve Wozniak said he's worried about the "horrendous" problems cloud computing could cause as users yield control of their data to service providers. Read More

Programming decathlon: 10 events to test your app dev mettle
The Olympics have nothing on these 10 programming tasks tuned to test true endurance, versatility, and intestinal fortitude Read More

25 Awesome Gadgets for $50 or Less
We scoured the Web for the best deals on 25 gadgets you might actually want to buy. All you have to do is sit back and click through the slideshow. Read More



SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Four high-level Facebook officials resign in the past week
  2. Obama weighs executive order on cybersecurity
  3. I am not a normal person, I run on Linux
  4. Awesome interactive map shows global Internet usage stats
  5. Sprint CEO Dan Hesse talks about Sprint's $15 billion iPhone investment
  6. Bill Clinton to give opening keynote at Dell event
  7. Recent cloud critics, including Wozniak, intensify debate
  8. 6 hottest IT certifications
  9. 25 awesome gadgets for $50 or less
  10. Open-source movements butt heads over logo

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment:

  1. Now day by day the use of internet is rapidly increase. Vast use of internet the whole world is now connected in a single node. With such a high dependency on computers, neglecting the increase in Cyber crime is extremely harmful. Thanks a a lot for this site.

    Intelligence Management



    ReplyDelete