Tuesday 9 August 2011

Microsoft's Push Back Against Spammers

DARPA expands insider threat research | Defcon: The security penetration testing quagmire

Network World Security

Forward this to a Friend >>>


Microsoft's Push Back Against Spammers
It's fashionable to beat up Microsoft as the gang that can't shoot straight. The willingness of the press and individuals alike to fall for the "IE users are dumb" scam is a great example of this. Read More


WHITE PAPER: Quest Software

Controlling and Managing Super User Access
Effectively managing privileged – aka "super user" – accounts is vital for addressing your company's security concerns. In this Quest white paper, see why native tools are limited when managing these accounts. Read now!

WHITE PAPER: Splunk

Autodesk Gains Visibility into MSP Metrics with Splunk
See how Splunk has become the tool that is allowing Autodesk to crack the MSP "black box" and measure critical metrics and SLA performance. Read more.

DARPA expands insider threat research
The ability to detect insider threats and behaviors from a plethora of live data is the goal of an ambitious research program being undertaken by the military's Defense Advanced Research Projects Agency (DARPA). Last week DARPA took a big step toward realizing the potential of the program it calls Anomaly Detection at Multiple Scales (ADAMS) by picking Raytheon to help develop it further. Read More

Defcon: The security penetration testing quagmire
The relationship between CISOs and security penetration testers is anything but clear cut and raises ethical issues for both parties, a Defcon crowd heard from a former CISO. Read More

Top 8 ways feds (and corporate users) can take advantage of green IT
How does the federal government go about implementing green IT? According to a report out today from the Government Accountability Office, the feds have adopted a number of practices that are useful not just for government IT but all manner of private and public company IT groups as well. These include everything from dedicated funding for green products, to improved employee training and reducing use of paper. Read More


WHITE PAPER: Dell

The Business Case for Security Information Management
It is a mistake to assume that information security is solely a technical problem left for IT to solve. This guide is a non-technical discussion of security information management. Learn more.

Cyber-espionage attacks threaten corporate data in new unrelenting ways
Stealthy, sometime long-term cyber-espionage attacks to steal sensitive proprietary information -- what some now call "advanced persistent threats" (APT) -- have become a top worry for businesses. Read More

Freedom and privacy, R.I.P.
Gibbs sees two kinds of privacy, and if both aren't already lost, they soon will be. Read More

Healthcare IT Consumers Fear Data Loss From EHR Systems
Nearly 80% of U.S. consumers say that they're wary of electronic health records because they fear that their personal information might be stolen or lost. Read More


WEBCAST: Akamai Technologies, Inc.

Saving cloud computing users from evil doers
This video panel discussion delves into IT's current and future security threats. Topics include web application security, vulnerabilities, threats and mitigation/defense strategies, and tactics with individual perspectives on the magnitude and direction of threats. Learn more

Defcon: The lesson of Anonymous? Corporate security sucks
Anonymous has run up quite a score against corporations, governments and law enforcement agencies, but for all these warnings corporate executives are turning their heads from the real problem -- their network security is terrible, a panel of experts concluded at Defcon. Read More

AntiSec hackers dump data after hacking police websites
The war between law enforcement and the Anonymous hacking collective continued this weekend as hackers dumped a 10 gigabyte database that included private e-mails and information sent by confidential informants. Hackers say they stole information during an attack on more than 70 small-town law enforcement agencies. Read More

Black Hat: Apple does well but Microsoft does better with enterprise security
While still not great, the operating systems behind Apple desktops, laptops and phones are getting more secure, researchers at Black Hat say. While not recommended for corporate use unless it's in islands within larger networks, the OSX operating system has made strides, says Alex Stamos, who lead a team of researchers from iSec Partners that researched the OSX and Windows 7 operating systems. Read More

Three tips for a better Anonymous
Has the Anonymous movement reached a midlife crisis? Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Chromebooks you can buy now
Here's a roundup of computing devices that run Chrome OS, a few which you can buy now, or which may be on the way.

MOST-READ STORIES

  1. 4 reasons Windows Phone 7 will beat iPhone and Android
  2. Former Cisco engineer indicted on hacking charges
  3. iPhone 5 rumor rollup for the week ending Aug. 5
  4. 16 milestones of a million, a billion or more ... from the past month
  5. Cisco nabs Juniper sales execs
  6. Researcher picks apart Sophos antivirus package
  7. Apple does well but Microsoft does better with enterprise security
  8. AntiSec hackers dump data after hacking police websites
  9. Scariest Black Hat story so far: Power plants at risk
  10. Black Hat: routers using OSPF open to attacks

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment