Wednesday, September 10, 2014

Microsoft Patch Tuesday thwarts nosey malware

Pay up for talent? Is there a security salary disconnect? | Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat updates

Network World Security

Microsoft Patch Tuesday thwarts nosey malware
This month's round of Patch Tuesday updates includes a critical fix for Internet Explorer Read More


RESOURCE COMPLIMENTS OF: Code 42 Software

SharePlan–Secure, enterprise-ready file sync and share
SharePlan is the secure file sync and share solution that balances the needs of employees with the technical requirements unique to enterprise IT. SharePlan is built on the Code42 engine, leveraging the same proven, enterprise-grade administration, security and management capabilities used by CrashPlan, our award-winning endpoint backup solution. See how simple SharePlan truly is–so simple it makes everything else seem way harder. Then download our Enterprise File Sync and Share Toolkit to access white papers, executive briefs, tech notes, on-demand webinars and more.

WHITE PAPER: OPSWAT Inc.

Secure the Use of Portable Media in Critical Infrastructure
Securing critical infrastructure is crucial to ensuring that our current way of life is sustained. Our whitepaper provides insight into the development of strong security policies around the use of portable media, and how to effectively mitigate the threat from external sources. Learn more

Pay up for talent? Is there a security salary disconnect?
Demand for security talent has never been higher. Security spending, according to market research firm Gartner, is expected to grow nearly 8% this year. And few would argue that data breaches are under control. And yet, in our discussions with many security professionals throughout all levels of experience and expertise you often hear that enterprises are simply not willing to pay what is necessary for talent.[Five CISO skills critical to your success in the next five years]To read this article in full or to leave a comment, please click here Read More

Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat updates
The new Flash Player update patches 12 vulnerabilities, many of which could allow remote code execution Read More


WHITE PAPER: Samsung

Scaling the Mobile Enterprise
Not all employers are ready to jump into the mobility space. There is a lot more to consider than just productivity, revenue growth, and operational efficiency – they have to consider security, device fragmentation, application and content complexity as well as cost to implement enterprise mobility. Learn More

Senators call for investigation of Home Depot breach
The U.S. Federal Trade Commission should investigate security practices at Home Depot following media reports that the hardware retailer’s payment systems have been breached, two U.S. senators said Tuesday.Home Depot’s U.S. and Canadian customers who shopped in stores since April may be affected by the breach, the company said Monday, following news reports of the compromise.The breach raises questions about the retailer’s security measures, Senators Richard Blumenthal, a Connecticut Democrat, and Ed Markey, a Massachusetts Democrat, wrote in a letter to the FTC.To read this article in full or to leave a comment, please click here Read More

Carnegie Mellon develops smart, bright headlights that won't blind oncoming drivers
Carnegie Mellon Carnegie Mellon researchers say they have come up with a smart, programmable headlight that in the future would let drivers utilize the increased visabiltiy of their car’s high-beams without blinding oncoming drivers.“The programmable headlight senses and tracks virtually any number of oncoming drivers, blacking out only the small parts of the headlight beam that would otherwise shine into their eyes. During snow or rain showers, the headlight improves driver vision by tracking individual flakes and drops in the immediate vicinity of the car and blocking the narrow slivers of headlight beam that would otherwise illuminate the precipitation and reflect back into the driver's eyes,” the researchers at Carnegie Mellon University's Robotics Institute stated.To read this article in full or to leave a comment, please click here Read More


: McAfee

Needle in a Datastack Report
The volume of security-related data today can make identifying a threat like looking for a needle in a haystack. Yet collecting more data also plays a transformational role in information security. Organizations need to learn how to harness and sift through this wealth of information to protect themselves from the threats they face every day. Learn more >>

Encryption failures fixed in popular PGP email security tool Enigmail
Developers of the popular Enigmail email security extension for Thunderbird have fixed several issues that could have exposed messages users believed to be encrypted.Enigmail provides a graphical user interface in the Mozilla Thunderbird and SeaMonkey programs that allows users to digitally sign and encrypt email messages using the OpenPGP standard.The Enigmail Project released version 1.7.2 of the extension on Aug. 29 and briefly noted that the release fixes “several important bugs.” The changelog did not contain additional details about the impact of the fixed issues, but included a link to the project’s external bug tracker.To read this article in full or to leave a comment, please click here Read More

Book Report: Cyberstorm by Matthew Mather
In spite of the volume and sophistication of recent cyber-attacks, there are still plenty of folks who scoff at the notion of “cyberwar.”  It is not unusual for military types to assume the role of doubting Thomas by dismissing cyber-attacks as “weapons of mass disruption.”  They go on sarcastic quips saying that a brief blackout or ATM network outage doesn’t really qualify as a national security event. Having spent the last dozen years of my life in the cybersecurity domain, I vehemently disagree with this minimalist notion but it is truly difficult to describe what might happen.  Former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States, Richard Clarke does a good job of painting a picture of a cyber-attack on critical infrastructure in his 2010 book Cyberwar, but his account is only a few pages long.  Daniel Suarez tells a gripping story in Daemon and Freedom, but this is more of a science fiction thriller than a more likely view of reality. To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

7 sexy smartphone technologies coming your way

A slew of new technological features are (or could be) coming to future smartphones. Here are seven that have been in the news over the last few years.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Consumers will adopt the IoT, report says

2. Last-minute iPhone 6 rumors: Release date, water proof, shatter proof and more

3. Internet of Overwhelming Things

4. Netflix looking to hire a 'Chaos Engineer'

5. How the Terminal makes Ubuntu Touch worth us

6. UCLA, Cisco & more join forces to replace TCP/IP

7. Debunking the top open source myths

8. 10 things you need to know about Linux Mint 17

9. The last iPhone 6 rumor roundup: 11 predictions for Sept. 9

10. Beefier servers pack more storage, DDR4 memory


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment