Tuesday, January 29, 2013

5 years after major DNS flaw is discovered, few US companies have deployed long-term fix

  Printers join fray in network vulnerability landscape | Pentagon hiring binge won't guarantee more security
 
  Network World Security

Forward this to a Friend >>>


5 years after major DNS flaw is discovered, few US companies have deployed long-term fix
Five years after the disclosure of a serious vulnerability in the Domain Name System dubbed the Kaminsky bug, only a handful of U.S. ISPs, financial institutions or e-commerce companies have deployed DNS Security Extensions (DNSSEC ) to alleviate this threat. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

WHITE PAPER: Qualys

Vulnerability Management Buyer's Checklist
Choosing a solution for VM is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security. Read Now!

Printers join fray in network vulnerability landscape
Printers are not the typical paths cybercriminals take into corporate networks. Nevertheless, the devices have become a concern among experts who see them as an ignored weakness in network defenses. Read More

Pentagon hiring binge won't guarantee more security
A Pentagon plan to hire another 4,000 cybersecurity professionals, for both defense and offense, will improve the employment and salary prospects of those with the right skills. Read More


WEBCAST: CDW Corporation

Unified Threat Management: A Better Approach to Security
In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More.

DARPA wants electronics that can dissolve or burst apart after use
The Mission: Impossible TV show famously started most episodes with a tape recorded mission message that ended with: "This tape will self-destruct in 5 seconds, good luck Jim." Then it melted down in a burst of smoke and flame. Read More

Startup NetCitadel aims to orchestrate security management controls in virtualized nets
Startup NetCitadel today launched with a product called OneControl intended to automate what might otherwise be manual research and changes related to configuring firewalls, switches or other gear when virtual-machine (VM) workloads are spun up or down in enterprise data centers or cloud environments. Read More


WHITE PAPER: Quest Software

The Right Way to Prove Identity and Establish Trust
Right now, someone's logging into your network and accessing proprietary data. Do you know who it is? Ensuring the identity of the person(s) trying to access your network is harder than ever. This Quest technical brief explains why two-factor authentication is superior to password authentication. Read Now!

Cybersecurity Hacktivism = Cybersecurity Escalation
I was changing the channels this weekend and landed on the local news. Before moving on, I happened to catch two "local" stories: 1. Citizen's Bank, a fairly large regional bank based here in New England was experiencing a Distributed Denial of Service (DDOS) attack. A group of Iranian hackers called the Martyr Izz ad-Din al-Qassam Cyber Fighters claimed responsibility. 2. The hacktivist... Read More

HP offering data-breach response and remediation services
HP today announced data-breach remediation services intended to help organizations prepare for an incident related to data loss that would require fast response to meet both legal and digital forensics requirements. Read More

Unseen, all-out cyber war on the U.S. has begun
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet Read More

 
 
 

SLIDESHOWS

13 markets you might not associate with Cisco
Cisco's "Internet of Everything" initiative takes it into unchartered territory.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Press, bloggers fall for iPhone cup holder 'joke'
  2. New server can be parachuted into extreme environments
  3. Weird and wonderful high-tech inventions of the world
  4. Samsung Galaxy S 4 buzz still white-hot
  5. A coffee-drinking iPhone owner's pipe dream
  6. Backdoor accounts found in networking and security appliances from Barracuda Networks
  7. Ex-Cisco engineers tackle Layer 4-7 SDNs
  8. Microsoft can 'start printing money' as soon as it launches Office for iOS
  9. Anonymous hits U.S. government site, threatens release of secrets
  10. Symantec CEO on reorg: "our system is just broken"
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment