Search This Blog

Friday, June 24, 2011

Lockdown: How would you handle emergency network operations?

Anonymous, LulzSec bring bragging rights back to hacking, CTO says | Report: US FTC preparing to serve subpoenas to Google

Network World Security

Forward this to a Friend >>>


Lockdown: How would you handle emergency network operations?
Are you ready for a natural disaster, denial of service or security breach? If one happened right now, would you have a plan ready to respond to it? What the recent highly publicized security breaches demonstrated was that some companies were ready and some were woefully unprepared. Part of that has to do with technology and security controls, but most of it is about planning and process, not tools. So what does it take to be ready for an attack? Read More


WHITE PAPER: IBM

Managing Data and Application Security Risks
This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit Read Now

WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

Anonymous, LulzSec bring bragging rights back to hacking, CTO says
Hactivist groups such as Anonymous and LulzSec hearken back to earlier days when Web attacks were done for bragging rights, not profits, says the new CTO of incident-response, forensics company Mandiant. Read More

Report: US FTC preparing to serve subpoenas to Google
The U.S. FTC is preparing to service Google with subpoenas related to an antitrust investigation, according to a news report. Read More

Project PM Leaks Dirt on Romas/COIN Classified Intelligence Mass Surveillance
If you are not sitting, please do so. Although I don't advocate drinking, you might also pour a double-shot of whiskey to prepare yourself for distinctly unpleasant news about immensely sophisticated mass surveillance called Romas/COIN, or soon to replaced by a similar program known as Odyssey. The nature and extent of the "counter intelligence" operation can be glimpsed in part by closely inspecting... Read More


WHITE PAPER: F5 Networks

Providing Security and Acceleration for Remote Users
Delivering applications to remote users is a significant undertaking. Applications need to be available, and they must be delivered securely and quickly. Through a range of products, F5 has solved the security plus acceleration challenge for remote users with BIG-IP Edge Gateway and BIG-IP APM. Read More!

Hypersonic airliner promises zippy, spacecraft-like flight
Aerospace giant EADS this week said it is looking to develop and ambitious commercial transport aircraft that can fly at speeds of about Mach 4 while having a limited impact on the environment. The aircraft, called ZEHST (Zero Emission High Supersonic Transport), would be targeted at long-haul routes - like Tokyo-Paris or Tokyo-Los Angeles where it could make the flight in less than 2 hrs 30 min, EADS... Read More

AT&T iPad hacker pleads guilty
A 26-year-old man who last year helped hackers publish personal information belonging to about 120,000 iPad users pleaded guilty to fraud and hacking charges in a New Jersey court Thursday. Read More

Securing mobile devices requires enterprise and service provider controls
Enterprises are adept at securing and managing computing endpoints such as desktop and laptop computers, but most do not have the same controls and processes in place for what is likely the fastest-growing computing platform: smartphones and other smart mobile devices. Read More


WHITE PAPER: HP

Shift to Innovation Over Converged Networks
The FlexNetwork paper addresses how HP FlexNetwork architecture can eliminate network silos, inconsistencies and layers that add complexity and hinder performance in your legacy networks—while at the same time freeing up stranded capital for IT innovations and new business model creation. Read now!

Feds claim victory over Coreflood botnet
Federal authorities have declared victory over the Coreflood botnet and shut down the replacement server that the FBI used to issue commands to infected PCs. Read More

India has issued 9.5 million digital identity numbers
India has issued digital identities to about 9.5 million people so far, and plans to step up enrollment to 1 million a day from October, the head of the agency issuing the biometric identities said on Thursday at a conference in Bangalore. Read More

FBI hits Latvian scareware peddlers who infected 1 million
The U.S. Federal Bureau of Investigation has taken aim at two Latvian gangs that allegedly made tens of millions of dollars by sneaking fake virus warnings onto victims' computers and then charging them to clean up the mess. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

The 7 worst tech merger ideas ever
In this slideshow, we'll take a look at seven proposed mergers that we hope will never see the light of day, as their consummation would likely mean the end of the entire tech industry and possibly even the entire world.

MOST-READ STORIES

  1. Why I dumped my 4G Android for an iPhone
  2. CFOs lack faith in CIOs and IT teams, survey shows
  3. Project PM leaks dirt on Romas/COIN
  4. Microsoft confirms BPOS cloud outage
  5. LulzSec members to be outed by Netherlands hacking group
  6. 12 ways the cloud changes everything
  7. Essential gadgets for the road warriors
  8. Company claims it can disregard GPL requirements
  9. iPhone 5 rumor roundup for the week ending June 10
  10. A Cisco engineer says changes at Cisco are good

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: