Tuesday 23 August 2011

Security rundown for week ending Aug. 19

Cisco adds wireless-only endpoint security option | Microsoft disables 'supercookies' used on MSN.com visitors

Network World Security

Forward this to a Friend >>>


Security rundown for week ending Aug. 19
Some older assumptions about security -- such as firewalls are needed for perimeter defense, and we'll all make do with reusable passwords and browser-based SSL connections provide great security -- were once again ripped apart as we heard this week from several individuals who say they simply don't agree. Read More


WHITE PAPER: CA Technologies

Ponemon: Security of Cloud Computing Providers
This report offers the cloud providers beliefs on the state of cloud security. In addition, it compares the findings from both reports, determining similarities and discrepancies between cloud computing users and providers. Learn More

WHITE PAPER: Akamai Technologies, Inc.

Taming the Cloud
This whitepaper explores the components of the cloud computing ecosystem, demonstrates how Akamai is delivering services for cloud optimization, and looks forward into the evolution of this dynamic and growing market. Read now

Cisco adds wireless-only endpoint security option
Remember back in April, when Cisco overhauled its network management strategy and announced the Cisco Enterprise Prime product portfolio? The company has now decided to offer at least one component of the suite -- the Identity Services Engine (ISE) -- as a stand-alone, wireless-only module. Read More

Microsoft disables 'supercookies' used on MSN.com visitors
Microsoft has disabled an online tracking technology that a Stanford University researcher said allowed the company to sneakily track users on MSN.com -- even after they deleted browser cookies and other identifiers. Read More


WHITE PAPER: Riverbed

Case Study: Boston College
Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now

NASA is NOT predicting an alien invasion
There has been a bit of a dust-up in the space information world this week as a number of press outlets seized on what at first blush was reported to be NASA study saying alien armies might destroy Earth because of our greenhouse gas issues. Thing is the report is real and interesting mind you but it isn't NASA's. Which has NASA concerned because a number of sites have headlines like this: Read More

Anonymous breaches another US defense contractor
The politically oriented hacking group Anonymous has released 1GB of what is says are private e-mails and documents from an executive of a U.S. defense company that sells unmanned aerial vehicles to police and the U.S. military. Read More


WHITE PAPER: Akamai Technologies, Inc.

Leveraging Cloud Security to Weather Threatening Storms
This paper assesses the current cyber threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern day IT threats. It takes a close look at DDoS defense in particular. Read now

3G cellular network-in-a-box provides service to disaster zones and remote locations
We've all cursed our cell service providers when the signal peters out. But what if there's no signal at all because you are so remote or the network has been knocked offline by a disaster? Now there's a turnkey 3G cellular network-in-a-box that emergency agencies and commercial businesses are using to bring a signal to where none exists. Read More

Be prepared: Physical security is migrating to your (IT) domain
It is clear that video has a terrible reputation, and also clear that the IT industry on the whole is relatively unaware of trends in video surveillance and security. But, just as VoIP brought the world of telephony under the IT umbrella, the rise of network-based surveillance systems is bringing physical security under the network administrator's province as well. Read More

The world's geekiest license plates
This slideshow is filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Tips and tricks for protecting Android devices
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy, and data.

MOST-READ STORIES

  1. HP's webOS crashes under Apple, Android pressure
  2. Torvalds says, "Virtualization is evil"
  3. Linus Torvalds: ARM has a lot to learn from the PC
  4. With SSL, who can you really trust?
  5. The collar bomber's explosive tech gaffe
  6. HP PC spin-off puts pressure on Microsoft to nail Windows 8
  7. HP plans PC spinoff, $10 billion Autonomy buy
  8. HP kills tablets, confirms PC spin-off plans
  9. Dropbox cloud was a haven for data thieves, researchers say
  10. NSTIC director: 'We're trying to get rid of passwords'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment