Friday 19 August 2011

With SSL, who can you really trust?

NSTIC director: 'We're trying to get rid of passwords' | Cisco counterfeiter gets 30-months in jail

Network World Security

Forward this to a Friend >>>


With SSL, who can you really trust?
SSL, the encryption scheme that protects virtually all secure online transaction, requires that users rely on trusted third parties, but what if they can't be trusted? Read More


WHITE PAPER: HP

HP IT Migrates to an all HP network
It's no surprise when a high-tech company uses its own products. However, the story of how HP recently migrated its own network to HP Networking equipment has unique aspects that make it relevant to all enterprises in any industry or market segment. Read now

WHITE PAPER: F5

Controlling Migration to IPv6: A Gateway to Tomorrow
This White Paper describes how the BIG-IP LTM system help organizations migrate to IPv6, and can operate as an IPv4 to IPv6 gateway; operating identically in either environment, and within mixed environments. Learn More!

NSTIC director: 'We're trying to get rid of passwords'
The federal government's National Strategy for Trusted Identities in Cyberspace (NSTIC) program is trying to identify more secure alternatives to simple passwords that the government as well as anyone else might use in authenticating to online applications. Read More

Cisco counterfeiter gets 30-months in jail
The Department of Justice today said Donald Cone of Frederick, Md., was sentenced to 30 months in prison for his role in a sophisticated conspiracy to import and sell counterfeit Cisco network equipment. A federal jury convicted Cone -- who was also ordered to pay $143,300 in restitution -- and a co-conspirator, Chun-Yu Zhao in May 2011 after a three-week trial. Zhao will be sentenced on Sept. 9,... Read More

Inspector Gadgets: Windows 7 gadgets for monitoring your PC
It's been nearly two years since Windows 7 was released, and yet there are still some features that Windows 7 users may not be taking full advantage of -- such as desktop gadgets. Similar to the Mac's Dashboard Widgets, Windows desktop gadgets are mini-applications that reside on your desktop and can display live data, perform simple functions like search or password generation, or give you a sneak peek inside the inner workings of your PC. Read More


WHITE PAPER: CA Technologies

Performance Metrics and the Cloud
Unlike static configuration management databases, which often contain information too outdated for real-time understanding, a dynamic operational service model provides relevant, timely information. Read More

Google highlights trouble in detecting web-based malware
Google issued a new study on Wednesday detailing how it is becoming more difficult to identify malicious websites and attacks, with antivirus software proving to be an ineffective defense against new ones. Read More

DoD: Sharing cyber-threat info with contractors is working
Halfway through a 90-day trial, the Department of Defense says it has stopped hundreds of attempted intrusions it would have missed otherwise without its pilot program of sharing classified information about cyber threats with military contractors. Read More

AES proved vulnerable by Microsoft researchers
Researchers from Microsoft and the Dutch Katholieke Universiteit Leuven have discovered a way to break the widely used Advanced Encryption Standard (AES), the encryption algorithm used to secure most all online transactions and wireless communications. Read More


WHITE PAPER: CA Technologies

CIOs Feel the Pressure to Optimize the Online Experience
In this exclusive survey, CIOs weigh in on the business impact of application performance. This white paper presents the survey results and offers guidance on building a business case to optimize the customer experience with consistently excellent application performance. Learn More

2011 State of the CSO
More budget? Perhaps a little. More attention from senior management? Yes, a bit. Better results? That's not so clear. Read More

Fired techie created virtual chaos at pharma company
Logging in from a Smyrna, Georgia, McDonald's restaurant, a former employee of a U.S. pharmaceutical company was able to wipe out most of the company's computer infrastructure earlier this year. Read More

The world's geekiest license plates
This slideshow is filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Tips and tricks for protecting Android devices
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy, and data.

MOST-READ STORIES

  1. 20 years of Linux: Then and now
  2. The collar bomber's explosive tech gaffe
  3. The world's geekiest license plates
  4. Dropbox cloud was a haven for data thieves, researchers say
  5. 10 scariest hacks from Black Hat and Defcon
  6. Linus Torvalds: ARM has a lot to learn from the PC
  7. Next-gen iPhone rumored to launch on Oct. 7
  8. Outsourced and fired, IT workers fight back
  9. On Linux's 20th anniversary, recounting past slights from Microsoft
  10. Whatever happened to Microsoft Forefront Endpoint Protection?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment