Tuesday, March 04, 2014

3rd party software, not Microsoft's, blamed for 76% of vulnerabilities on average PC

Why you need to segment your network for security | Nearly all apps are vulnerable in some way, report says

Network World Security

Forward this to a Friend >>>


3rd party software, not Microsoft's, blamed for 76% of vulnerabilities on average PC
Don't blame Microsoft if your PC is insecure, because three quarters of reported security vulnerabilities in 2013 were found in third-party software and not Microsoft programs. Yet also according to the Denmark-based security firm Secunia that analyzed vulnerabilities in the top 50 most-used software products, the number of holes in Windows 7 and XP doubled in 2013 and Windows 8 was the operating system... Read More


RESOURCE COMPLIMENTS OF: Sophos

Gartner Magic Quadrant for Mobile Data Protection
Get the information you need to choose the right encryption product – compliments of Sophos. Click to continue

WHITE PAPER: Symantec

Security Requirements for Electronic Health Records
Download this whitepaper to learn about the challenges surrounding the new world of EHR technology, including the requirements that govern protecting confidential patient data online. The report also details the measures that organizations need to start taking now to prepare for the upcoming changes in the healthcare industry. Learn More>>

Why you need to segment your network for security
Pen tester Mark Wolfgang argues segmenting for security is a key piece of an overall defense-in-depth strategy. Here he explains why and how to accomplish it in your organization (registration required) Read More

Nearly all apps are vulnerable in some way, report says
Cenzic, a developer of application security assessment tools, has published a report (PDF) that claims 96% of all apps tested showed at least one security issue, ranging from poor programming practices to excessive access. Read More


WHITE PAPER: PC Connection | Cisco | Intel®

Overcoming the Security Challenges of the Cloud
PC Connection, in partnership with Cisco and Intel®, recently conducted a survey to learn how organizations are using the cloud. In this white paper, you'll learn what you can do to mitigate security concerns and make the most out of the cloud. View Now

RSA Conference Recap: Positive Direction for Security Industry
Last week's RSA Conference was a whirlwind of meetings, presentations, and unusual west coast rain storms. I'm not sure about the attendance numbers but it seemed especially busy - not surprising after the many cybersecurity events of 2013. I met with around 40 different security vendors throughout the week and heard some encouraging news. Rather than crow about the latest technology fad or... Read More

Meetup site down after hacker sought to extort $300 from CEO
Meetup's website remained offline Monday, the victim of a massive DDoS attack, which began last week with an email asking the company's CEO to cough up US$300, or else. Read More


WHITE PAPER: HP

Rethinking Your Enterprise Security
The world is constantly evolving, and always connected, and your enterprise must be too. Enterprises realize they need to focus on a sustainable approach to security and risk management - one that is designed to address the new wave of vulnerabilities that prevail due to increasing trends in IT consumerization, mobility, and cloud computing. Learn More

Google Map jacker called a hero by feds he wiretapped
When you Google a business, do you trust the Google Map listing enough to call the phone number or use it for navigation purposes? You totally shouldn't, according to Bryan Seely. Read More

Stephen Colbert pitches own security solution at RSA Conference
Stephen Colbert's pitch for new data security company "Cloud Fog" and other highlights from RSA Conference keynote in San Francisco. Read More

The paranoid's survival guide, part 1: How to protect your personal data
Who says privacy is dead? While it's true that marketers, the government, data aggregators and others are gathering and analyzing more data than ever about every individual, you can still exert some control over what's out there, who's tracking you and what they do with that information. Read More


SLIDESHOWS

The 700MHZ spectrum: Who owns what?

700MHZ spectrum holdings, from T-Mobile to Verizon and AT&T to Echostar.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Free tools for Windows Server admins

2. FIRST LOOK: Cisco Nexus 9000

3. Cisco: $300,000 prize for Internet of Things security apps

4. Google Map jacker called a hero by feds he wiretapped

5. First Look: Cisco ACI re-imagines the enterprise data center network

6. Who's hiring? Marketing lures more tech pros

7. Is SDN your next security nightmare?

8. RSA security attack demo deep-fries Apple Mac components

9. AT&T Petitions FCC to Trial All IP Voice in Two Cities

10. Six things companies do that thwart their IT security efforts


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment