Search This Blog

Friday, February 15, 2013

Microsoft patches IE with record-setting updates to prep browser for Pwn2Own

  Executive Order on Cybersecurity: Will It Spark Further Activity? | Multivendor power council formed to address digital certificate issues
 
  Network World Security

Forward this to a Friend >>>


Microsoft patches IE with record-setting updates to prep browser for Pwn2Own
Microsoft this week patched 14 vulnerabilities in Internet Explorer, preparing the browser for its time as a target early next month at the annual Pwn2Own hacking contest. Read More


WHITE PAPER: F5 Networks

Solving Substantiation with SAML
Read this paper to learn how F5 uses SAML to effectively enable secure web domains to exchange user authentication and authorization data, providing users of web browsers with single sign-on (SSO) convenience they need. Learn More!

RESOURCE COMPLIMENTS OF: KnowBe4

How big is your 'phishing attack surface'?
Many email addresses of your organization are exposed, allowing cybercriminals to launch spear-phishing attacks. The bigger the attack footprint, the higher your risk. Fill out the form and we'll email you the list of exposed addresses. Sign up for your FREE EEC now:

Executive Order on Cybersecurity: Will It Spark Further Activity?
As Bruce Springsteen once sang, "you can't start a fire without a spark." With this in mind, President Obama issued an executive order on cybersecurity this week. Will this truly be a spark? To answer that question, it is worthwhile to start by describing what the executive order does. There are really three main points as the order: 1. Directs the Federal government (primarily DHS) to create... Read More

Multivendor power council formed to address digital certificate issues
With cyber-criminals increasingly exploiting digital certificates to undermine security the vendors with the most influence as certificate authorities have banded together to try and speak as an industry group to advocate for security best practices. Read More

Merchants urged to avoid BYOD gear, jailbroken smartphones/tablets for payment processing
Businesses that want to make use of consumer-grade smartphones and tablets as a point-of-sale device to process payment cards are being advised to only do so when appropriate encryption controls and other security measures are in place. Read More


WHITE PAPER: HP

Providing Security for Software Systems in the Cloud
The software industry has learned that putting fancy boxes on the network doesn't fix bad software, cloud converts must focus on the risks they bring along with the software they deploy. This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk. Learn more.

Ditch the PDF headaches: Three safer, speedier Adobe Reader alternatives
Another day, another critical security exploit discovered for Adobe Reader. Ho-hum. The PDF software's near-ubiquitous presence has made it a big, fat, juicy target for years now, and by this point, you shouldn't be asking what Adobe's going to do to shore up its perpetually leaky program. Instead, you should ask yourself: Why are you still using Adobe Reader at all? Read More

Phishing attacks target home workers as easy 'back door'
Employees working from home could be an easy back door allowing targeted attacks to get behind an organisation's email defences, a survey from security training firm PhishMe has suggested. Read More

Adobe confirms zero-day exploit bypasses Adobe Reader sandbox
A recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and is probably part of an important cyberespionage operation, the head of the malware analysis team at antivirus vendor Kaspersky Lab said. Read More


WHITE PAPER: McAfee

Next Generation Network IPS
This paper discusses the six critical management capabilities of next-generation IPS solutions to help reduce operational overhead while unifying across multiple environments, streamlining security operations and protecting against targeted threats. Read Now

Internet Explorer only? IE doubt it
Just as Internet users in general have defected in huge numbers from Microsoft Internet Explorer over the past several years, the business world, as well, is becoming less dependent on the venerable browser. Read More

Inmate data paroled from mainframe
There were a number of glaring IT problems facing the Illinois Department of Corrections. The answer: A cloud-based replacement system. Read More

10 biggest time killers at work
Read More

 
 
 

SLIDESHOWS

12 hybrid cloud security products to watch

Here are 12 security products that you can buy for your hybrid cloud whether they run on premise, in the cloud or a little of both.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. No good deed goes unpunished, Dolly Parton edition

2. Ultimate Google toolbox: 20 tips, tricks and hacks

3. iOS devices hobble Exchange servers when they synch

4. Internet Explorer only? IE doubt it

5. 10 biggest time killers at work

6. Android phones are connecting without carrier networks

7. Windows 8 update: Bill Gates gushes about Surface Pro

8. Microsoft unleashes a Patch Tuesday to make your head spin

9. Career advice that will change your life

10. SDN meet sheds little light on Cisco 'Daylight'

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: