Search This Blog

Friday, January 18, 2013

Security Holy Grail anyone?

Big Data Security Challenges | Kaspersky Lab's "Red October" cyber-espionage saga leaves lots of questions unanswered

Network World Security

Forward this to a Friend >>>


Security Holy Grail anyone?
It sometimes feels like the entire planet is working on some sort of security technology to protect the networked world from insiders, outsiders and just plain nasty ne'er do wells. The researchers at the government's "high-risk, high-payoff research" group, Intelligence Advanced Research Projects Activity (IARPA) want to go beyond the mundane security research and development and get right to the... Read More


WEBCAST: CDW Corporation

The Best Path to SaaS
Cloud computing is here to stay. Software-as-a-Service (SaaS) is particularly popular because it can lower cost while enabling business agility. But not all applications are suited to SaaS. In this Webcast you will learn the best applications for SaaS deployment and how to avoid SaaS pitfalls and cost overruns. Learn More.

WHITE PAPER: HP & Intel® Xeon® Processors

Top 10 Benefits of Virtualization
In this eGuide, Network World sister publications InfoWorld, and PC World examine some of the current uses of blade servers in today's data center, as well as how trends such as server virtualization are reshaping enterprise computing. Read Now!

Big Data Security Challenges
According to ESG Research, 47% of enterprise organizations collect 6TB of security data or more on a monthly basis to support their cybersecurity analysis requirements. Furthermore, 43% of enterprise organizations collect "substantially more" security data then they did 2 years ago while an additional 43% of enterprise organizations collect "somewhat more" security data then they did 2 years... Read More

Kaspersky Lab's "Red October" cyber-espionage saga leaves lots of questions unanswered
Moscow-based anti-malware firm Kaspersky Lab says it's uncovered a years-long cyber-espionage campaign using phishing to target individuals in business, research and government offices mainly in Russia and Eastern Europe to steal sensitive data. This cyber-spy operation is also suspected to be run by Russian speakers. More about all of this is expected in the next day or so from Kaspersky Lab, which has lent an aura of drama to it all by calling the malware and its use "Red October." Read More


WHITE PAPER: Trusteer

Dealing with Advanced and Targeted Attacks
This whitepaper explains how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints. It reviews the evolution of advanced targeted attacks and the various approaches used to address them. Learn More.

Security vendors failing to tackle mobile malware, say CISOs
Malware is still the biggest threat to mobile security, but most mobile device management (MDM) strategies tend to focus on securing the physical device in case of loss of theft, according to Peter Gibbons, head of Information Security at Network Rail. Read More

Major flaw in Java-based Spring Framework allows remote-code execution by attackers
There's a major flaw in the Java-based Spring Framework open-source development code that allows remote-code execution by attackers against applications built with it, according to the security firm which identified the flaw. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Foxit patches critical vulnerability in PDF viewer browser plug-in
Foxit released version 5.4.5 of its Foxit Reader PDF viewer plug-in on Thursday in order to address a critical remote code execution vulnerability that could have allowed attackers to compromise computers running previous versions of the software. Read More

Day after patch, Java zero-day sold to highest bidders
Less than a day after Oracle issued a patch for a vulnerability in its Java browser plug-in software that was allowing attackers to get control of Windows PCs, yet another zero-day exploit for an unpatched Java security hole was being marketed on the Underweb. Read More

Privilege management could cut breaches -- if it were used
An employee who falls victim to phishing can let an attacker easily defeat the best security system. But experts say technology can at least partially trump those human weaknesses. It just has to be deployed, and deployed properly. Read More



SLIDESHOWS

9 essential Internet Explorer 10 add-ons
Quality add-ons for Internet Explorer are few and far between.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Kaspersky Lab's 'Red October' cyber-espionage saga leaves lots of questions unanswered
  2. 'Rogue clouds' giving IT staffs nightmares
  3. The dumbest products of CES 2013
  4. Cisco working on an IT simplification platform
  5. Verizon client worker outsourced part of his job to China so he could have more free time
  6. Oracle releases emergency Java patch; experts warn flaws may take 2 years to fix
  7. Bankers comparing bonuses? There's an app for that
  8. Cisco investigates reported Linksys router flaw
  9. Unlucky Las Vegas man besieged by lost-phone seekers
  10. Microsoft takes urgent step to patch stubborn Internet Explorer flaw

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: