Search This Blog

Monday, October 31, 2011

Security roundup for Oct. 28: Cloud security holes; Facebook vulnerable?; China hackers lambasted

68 great ideas for running a security department | Cisco rolls out military-strength encryption for ISR router

Network World Security

Forward this to a Friend >>>


Security roundup for Oct. 28: Cloud security holes; Facebook vulnerable?; China hackers lambasted
In last week's news, Amazon Web Services vulnerabilities were found and fixed, but other cloud service providers are probably susceptible to similar problems discovered by a German research team at Ruhr University Bochum. Read More


RESOURCE COMPLIMENTS OF: SafeNet

Are You Ready to Turn the Cloud On?
Your data is on the move and you need practical ways to secure and manage it, no matter where it lives, no matter what the environment. That requires pragmatic thinking, and ways to extend protection and compliance to virtual environments, while maintaining visibility and centralized control. It's time to turn the cloud on with SafeNet.

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn More!

68 great ideas for running a security department
Looking for inspiration? Want to learn a few new ways to elevate your security game? Can you spare five minutes to think strategically and long-term instead of just putting out another fire? Read More

Cisco rolls out military-strength encryption for ISR router
Cisco has announced a hardware encryption module for its ISR G2 router that allows point-to-point encryption of IP traffic based on what's called "Suite B," the set of encryption algorithms designated by the National Security Agency for Department of Defense communications. Read More

'Big Data' Prep: 5 Things IT Should Do Now
Got your "big data" plan in place? If not, you may want to start thinking about implementing one. Read More


WHITE PAPER: Akamai Technologies, Inc.

Understanding Web Application Security
This paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection. Learn more

Can humans alter climate change?
Can humans change the course of the environment? Seems like a stretch in many cases but scientists continue to look into the possibility of controlling greenhouse gases and reversing some of the toll of global warming. Read More

CISO members of Wisegate share best practices for GRC, SIEM and IAM
The CISO members of the social networking community called Wisegate usually share their best practices only with each other. Now Wisegate has compiled and made publicly available some of the members' security tips and best practices for GRC, IAM and SIEM implementations. Read More

10 Creepy Mobile Games
Halloween is just around the corner, so why not scare the pants off yourself by playing one of these Android or iOS games? Read More


WHITE PAPER: Oracle

Optimizing Information with a Tiered Storage Architecture
Oracle's approach to the use of tiered storage provides a solution that optimizes performance, cost and capacity across the breadth of storage media available today. Learn more.

Linux Foundation wades into Windows 8 secure boot controversy
The Linux Foundation today released technical guidance to PC makers on how to implement secure UEFI without locking Linux or other free software off of new Windows 8 machines. The guidance included a subtle tisk-tisk at Microsoft's Steven Sinofsky for suggesting that PC owners won't want to mess with control of their hardware and would happily concede that to operating system makers and hardware manufacturers.... Read More

Cisco ASA Upgrade Adds Identity Firewalling
Identity aware firewalling seems to be all the rage right now. Having the ability to make firewall policy decisions based on user and group information from Active Directory can have enormous benefits if used properly. The Cisco ASA recently acquired the identity aware firewalling ability with the release of 8.4.2 code. It works with Microsoft Active Directory, cut-through proxy and VPN authentications... Read More

Security as a Service – What's Inside Counts
This week I'm writing about cloud-based security services, or Security as a Service (SECaaS). What's great about SECaaS—like SaaS—is that it's delivered as a service with typically no on-premise gear required. In addition, it's generally pay as you go, and it's elastic. What is not so great about SECaaS is that it can be difficult to figure out if the provider will deliver a secure, reliable... Read More

Facebook shrugs off alleged attachment vulnerability
Facebook downplayed an alleged vulnerability in its social-networking site that could allow a hacker to send a potentially malicious file to anyone on Facebook. Read More

Number of fake antivirus attacks has decreased considerably, researchers say
The frequency of attacks that distribute fake antivirus software, a long-time pillar of the underground economy, has decreased considerably in recent months. However, security researchers warn that the industry is not yet dead and new versions of attacks continue to be released. Read More



SLIDESHOWS

20 high-tech toilets
Today's techiest toilets incorporate music players, motion-activated lids, heated seats, washing and drying functions, and more. Take a look.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Microsoft claims Hyper-V will leapfrog VMware
  2. DARPA offers $50,000 prize if you can figure out these shredded puzzles
  3. New Nokia phone name, Lumia, means 'prostitute' in Spanish
  4. HP to keep PC division, rejects spin-off idea
  5. Cisco rolls out military-strength encryption for ISR router
  6. Researchers find "massive" security flaws in cloud architectures
  7. Paycheck payoff for IT certs still declining
  8. Linux Foundation wades into Windows 8 secure boot controversy
  9. Attackers trick Facebook users into exposing secret security codes
  10. History of malware: from script kiddies to rootkits

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: