Wednesday 7 September 2011

How to Secure Your Apache Web Server

NSA extends label-based security to big data stores | Scammer "crams" $35 million in false phone charges -- from prison

Network World Security

Forward this to a Friend >>>


How to Secure Your Apache Web Server
Installing and maintaining a secure web server on Linux can be a challenge. It requires in-depth knowledge of Linux, Apache, and PHP server-side options. One of the main problems is to find the balance between security and productivity and usability. The best solution depends on the specific project requirements, but all installations share certain common characteristics. Here are some best practices... Read More


WHITE PAPER: Riverbed

Case Study: Boston College
Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now

WHITE PAPER: GFI Software

Security Considerations for SMEs
It is never possible to guarantee that a company is totally secure or that a breach will not occur, however implementing the latest tools and providing ongoing, end-user education will minimize those risks and allow companies to focus more on growing their business rather than repairing it. Read now!

NSA extends label-based security to big data stores
The National Security Agency has submitted new label-based data store software, called Accumulo, to the Apache Software Foundation, in hopes that other parties will further develop the technology for use in secure systems. Read More

Scammer "crams" $35 million in false phone charges -- from prison
The US Department of Justice said a man who placed $35 million worth of false telephone bill charges while serving jail time has been sentenced to 21 more years for the cramming scam. Read More


WHITE PAPER: PhoneFactor

Phones Become the Leading Multi-Factor Authentication Device
According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Read now

Hackers spied on Iranians using fake Google certificate
About 300,000 Iranians had their Gmail accounts compromised and their messages read by hackers, according to a forensics firm that has investigated the theft of hundreds of digital certificates from a Dutch company. Read More

Comodo hacker claims credit for DigiNotar attack
The hacker responsible for a stunning attack on a Dutch company that issues security certificates for websites warned on Monday that he would "strike back again," after previously breaching another company earlier this year. Read More


WHITE PAPER: Entrust, Inc.

A Practical Approach to Authentication
Enterprise authentication used to be simple: passwords for everyone, expensive tokens for a small number who work remotely. But the workforce is now mobile and confidential data is at risk. CIOs are now challenged to increase authentication security while preserving operational and budget efficiency. Read Today!

Mobile apps and security: What you need to know
A Melbourne-based app developer has spoken about the security pitfalls of smartphone apps, saying that while certain mobile environments are more susceptible to malware, such risks can be eliminated through encryption and using common sense. Read More

HP (again) shows us how not to do it
HP management has not been good to the company over the last few years. One would have to do a lot of searching to find a management team that has so thoroughly messed up in the court of public opinion. Read More

Customer Leaves Apple Store with Confidential Data
Time Machine backup of Apple Store's internal file server taken Read More

Microsoft: Stolen SSL certs can't be used to install malware via Windows Update
Microsoft said that a digital certificate stolen from a Dutch company could not be used to force-feed customers malware through its Windows Update service. Read More



SLIDESHOWS

What do top CIOs make?
How high can a senior IT leader ascend in the ranks of a public company? High enough to rank among a company's most highly paid executives. High enough to enjoy perks such as company cars, financial planning services, and access to the corporate jet.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. IPv6: What you need to do now
  2. iPhone5 rumor roll-up for the week ending Sept. 2
  3. Xsigo has a fabric to go up against Cisco, others
  4. 531 spy certs target CIA, Google, Microsoft, Mozilla
  5. HP's trusty 12c financial calculator turns 30
  6. 10 ways to enhance Google+
  7. Juniper, like Cisco, may cut staff
  8. Age bias in IT: The reality behind the rumors
  9. FAA slaps $175,000 fine on MIT for batteries that caught fire at FedEx
  10. Microsoft's 5 biggest weaknesses

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment