Search This Blog

Thursday, November 15, 2012

Gartner's state of cloud security: Outages are bigger risk than breaches

  SSL decryption may be needed for security reasons, but employees are likely to 'freak out' | Cybersecurity bill fails in US Senate
 
  Network World Security

Forward this to a Friend >>>


Gartner's state of cloud security: Outages are bigger risk than breaches
Security remains a chief inhibitor to enterprise adoption of cloud computing resources and one Gartner analyst says the biggest concern should not be that data could be compromised in the cloud, but rather that there may be a cloud outage that could lead to data loss. Read More


RESOURCE COMPLIMENTS OF: Sophos

Sophos Mobile Security Toolkit
Get resources to help you secure smartphones and tablets plus educate your users on mobile security risks. Click to continue

In this Issue


RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

SSL decryption may be needed for security reasons, but employees are likely to 'freak out'
There are plenty of reasons that a company might want to try and decrypt SSL sessions -- to stop outbound malware botnet connections that are decrypted, or to stop a rogue insider from sending out sensitive corporate information -- but be prepared to hear employees whose data traffic is decrypted complain loudly about their privacy being invaded. Read More

Cybersecurity bill fails in US Senate
The U.S. Senate has voted against moving forward on a cybersecurity bill that supporters have called critical for national security. Read More

15 Microsoft alumni: Where are they now?
Microsoft didn't become the industry giant it is today by hiring slackers, and that's proven by taking a quick look at some of its alumni and where they have wound up. Some went on to start their own companies, some went into nonprofit work, some became leaders of rival companies and one on our list -- so far at least -- seems to be just taking it easy. Read More

DARPA wants army of networked amateur astronomers to watch sky for space junk
There is really so much junk floating around in space the government needs help keeping track of it all. This week the Defense Advanced Research Projects Agency announced a program to utilize amateur astronomers to help watch space for any dangerous junk that maybe be threatening satellites or other spacecraft and even the Earth. If you have a telescope, great but the program will even install equipment... Read More


WEBCAST: VIPRE Antivirus Business

Mobile and Data Protection: Securing Today's Enterprise
Date: 12/13 at 2:00pm EST This webcast discusses the benefits and risks of today's mobile enterprise, patch management techniques, and how to secure your extended network environment. Learn More

Skype blocks password resets after trivial account hijacking flaw made public
Skype has disabled the account password reset option on its website following reports that the feature can be abused to hijack Skype accounts if the attackers know the email addresses associated with them. Read More

Startup debuts with cloud-based open-source identity and access management software
Startup ForgeRock makes its official debut today with cloud-based open-source identity and access management (IAM) software called Open Identity Stack intended to be used by enterprises and service providers to enable centralized provisioning and access management to enterprise, mobile and software-as-a-service applications. Read More

Palo Alto Networks aspires to anti-malware defense role with WildFire
Palo Alto Networks wants its next-generation firewall to be the center of enterprise security, giving it a malware-detection and analysis capability called WildFire that's intended to inspect all traffic passing through the firewall to detect targeted attacks within 30 minutes. Read More

Report: Cloud botnets, search poisoning and mobile attacks among 2013's biggest security issues
Researchers from the Georgia Tech Information Security Center today released their official 2013 cyberthreats forecast, detailing what they say will be the most serious computer security issues in the coming year. Read More


WEBCAST: Teradata

Big Data Done Right
View this on-demand webcast to learn how to reap the benefits of big data through a practical unified architecture; how to improve performance with in-memory technology; and how to lower costs and increase scalability through cloud computing. Register now.

Small-time ID fraud goes big time
The entrepreneurial small-business spirit is alive and well in cyberspace. Unfortunately, a significant piece of it is devoted to crime, and a significant piece of that involves identity fraud. Read More

Attention shoppers: Patch Internet Explorer immediately before you shop online
Today is the eleventh Patch Tuesday of 2012, but the first since the official launch of Windows 8 and Windows RT. There are six new security bulletins--a couple of which are particularly urgent, especially for anyone planning to do any online shopping this holiday season. Read More

Antivirus startup linked to infamous Chinese hacker
Anvisoft, a Chinese antivirus startup, has been linked to an infamous hacker suspected of developing sophisticated malware used to siphon sensitive information from Defense Department contractors in 2006. Read More

NASA scrambles to encrypt laptops after major breach
NASA is scrambling to implement full disk encryption on agency laptops after one containing unencrypted personal information on a "large" number of people was recently stolen. Read More

Adobe investigates alleged customer data breach
Adobe said Wednesday it is investigating the release of 230 names, email addresses and encrypted passwords claimed to have been stolen from a company database. Read More

 
 
 

SLIDESHOWS

How to set up secure Wi-Fi for BYOD
QuickConnect and XpressConnect offer cloud-based methods to automate BYOD client configuration and connection.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. App abuses Twitter IDs to produce bogus piracy 'confessions'
  2. Review: 6 slick open source routers
  3. Why is Steven Sinofsky really leaving Microsoft?
  4. NSA: Looking for a few good cybersecurity professionals
  5. OpenFlow startup takes aim at Cisco, VMware
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. iPhone to Android: How to make the switch
  8. 2013 IT salaries: 15 titles getting the biggest pay raises
  9. Mobile apps for me, me, me
  10. Extreme joins Cisco, Brocade, Huawei at 100G
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: