Search This Blog

Thursday, April 29, 2010

Cisco expands cloud-based security services

Conficker found on 25% of enterprise Windows PCs, Microsoft says | Google finds fake antivirus programs on the rise

Network World Security

Forward this to a Friend >>>


Cisco expands cloud-based security services
In the latest chapter of what it calls its "Secure Borderless Network" initiative, Cisco Wednesday is announcing expanded reporting capability for its ScanSafe Web-filtering service as well as the addition of a data-loss prevention option for the company's cloud-based e-mail security service. Read More


WEBCAST: Oracle

Identity and Access Governance – What You Need to Know
Live Webcast: Wednesday, May 5th at 1pm ET/10 am PT. Oracle presents a timely event featuring the Burton Group's, Kevin Kampman, who will provide an overview of the latest technology for identity management. Get guidance on compliance, security, identity management and other topics and participate in a live Q&A. Register Today!

WHITE PAPER: Citrix Systems

Tolly Group Performance Report
Tolly Report: "Citrix NetScaler with nCore Outperforms F5 BIG-IP" shows you how Citrix NetScaler beat F5 in head-to-head tests - providing 3X faster Web traffic, lower latency and higher throughput. Learn More!

Conficker found on 25% of enterprise Windows PCs, Microsoft says
Meanwhile, fake security software also becomes bigger threat, Microsoft says Conficker was far and away the most prevalent threat found on Windows machines in the second half of 2009 in the enterprise, Microsoft says. The company's security tools cleaned the Conficker worm from one quarter of enterprise Windows machines. Read More

Google finds fake antivirus programs on the rise
Fake antivirus software is becoming more prevalent on the Internet, with its creators using clever methods to fool users into installing the programs, according to a new report from Google. Read More


WHITE PAPER: Aerohive

Understand the Network Impact of 802.11n
As performance and reliability increase with 802.11n, the WLAN becomes a viable alternative to the wired network for mission- critical applications. This paper outlines the drawbacks of centralized controller-based approaches and how they will provide unavoidable roadblocks when faced with the increases in bandwidth provided by 802.11n. Read More!

Data breaches in U.S. cost more
The average cost to an organization of a data breach in the United States is higher than in four other countries where data-breach costs were compared, specifically Australia, France, Germany and the United Kingdom, according to a Ponemon Institute report published Wednesday. Read More

Monster tornado chaser armada set to rumble
A small army of 100 scientists and 40 sophisticated vehicles and unmanned aircraft are set to storm the Midwest chasing tornadoes looking to get a better understanding of the dangerous storms and help forecasters predict the destructive events. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

McAfee Debacle Shows Why Malware Defense Must Evolve
Last week a flawed DAT file from McAfee led to false positives crashing Windows XP systems and leading to a massive cleanup effort. It would be very easy to simply point the finger at McAfee, terminate the employment of a scapegoat security engineer or two, and continue on with the status quo, however the whole incident is an illustration of why the anti-malware industry--not just McAfee--need to embrace the U.S. Marines mantra to improvise, adapt, and overcome. Read More

Infosec: Kaspersky kills off the iPhone
The death of the iPhone is being foretold and the outlook for the PC and laptop aren't much better. Influential security company CEO Eugene Kaspersky told PC Advisor today that both are set to be consigned to history. Read More

Interop: HP sees no China-related threat to U.S. business
HP's immersion into China stemming from the purchase of 3Com does not present challenges as far as landing enterprise accounts in North America, specifically with large governmental institutions, according to the company's networking chief. Read More

RIM Exec on Mobile Malware, Future of BlackBerry Security
Scott Totzke knows mobile security. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

Confessions of tech hoarders
How much hardware do you have hidden in your home's nooks and crannies? One tech hoarder shares pictures of his stash, as well as those of some readers.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Apple reportedly tells Japanese discounters to stop selling online
  2. Google Apps vs. Microsoft Office
  3. Corporate IT just won't let IE6 die
  4. Diary of a mad McAfee antivirus victim
  5. Conficker found on 25% of enterprise Windows PCs
  6. Cereal hacker on defacement rampage
  7. Interop's hot new tech products
  8. Hackers exploit iPad popularity to spread malware
  9. Cisco announces CleanAir for Wi-Fi interference on new access points
  10. ET Phone Home using open source

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: