Search This Blog

Wednesday, July 24, 2013

How Cisco's Sourcefire acquisition impacts its security prospects

SIM card vulnerabilities easy to fix, researcher says | White House opposes amendment to curb NSA spying

Network World Security

Forward this to a Friend >>>


How Cisco's Sourcefire acquisition impacts its security prospects
It's interesting how the tech industry works. In late 2011, Cisco was in the midst of revamping itself, its stock was a shade under $14/share, and its investors calling for CEO John Chambers to resign. Today, Mr. Chambers is on quite a roll, Cisco stock is a shade under $26/share, investors are happy, the entire network product line has been revamped in the past year, and the company is creating some distance between itself and its network completion. Read More


WHITE PAPER: F5 Networks

IT Consumerization - A Shift to App-centric Security
This paper examines how BYOD 2.0 builds on the BYOD 1.0 foundation but makes a substantial shift from a device-level focus to an application-level focus to reduce overhead and unburden IT by allowing them to concern themselves only with the enterprise data and applications they need to secure, manage, and control. Learn More

WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

SIM card vulnerabilities easy to fix, researcher says
A pair of severe security problems in millions of SIM cards should be easy for operators to fix, according to the German security researcher who found the issues. Read More

White House opposes amendment to curb NSA spying
The White House is opposed to an amendment to a defense spending bill that would limit spending on mass surveillance by the National Security Agency. Read More

Researcher claims responsibility for security breach at Apple Developer website
An independent security researcher claimed responsibility for the security breach incident that forced Apple to close down its Developer Center website last week. Read More


WHITE PAPER: Code 42 Software, Inc.

The 5 Stages of Enterprise Endpoint Backup Grief
A large amount of mission-critical data exists exclusively on laptops and desktops - i.e. "endpoints" - making them a primary source of unnecessary data loss risk for today's organizations. Learn how Code 42 identified the five common stages of "enterprise endpoint backup grief." Learn more.

Cisco spending $2.7B for Sourcefire, company that commercialized Snort open-source security tool
Cisco announced a $2.7 billion deal to buy Sourcefire, the 12-year-old intrusion detection and prevention security vendor whose founder invented the open-source Snort IDS. Read More

New vulnerability found in Java 7 opens door to 10-year-old attack, researchers say
Security researchers from Polish vulnerability research firm Security Explorations claim to have identified a new vulnerability in Java 7 that could allow attackers to bypass the software's security sandbox and execute arbitrary code on the underlying system. Read More

Apple closes developer site after researcher's intrusive hack
Researcher who clipped 100,000 user records from Apple developer site to prove a point criticized by some security pros for his conduct. Read More


WHITE PAPER: Tripwire

10 Steps to Risk-based Security Management
Many professionals in information security espouse the belief—and commitment to—"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Learn More

U.S. cloud firms face backlash from NSA spy programs
Non-U.S. clients of American cloud hosting companies are clearly rattled by revelations that the U.S. National Security Agency collects huge amounts of customer data from Internet Service Providers and telecommunication companies. Read More

NIST closer to critical infrastructure cybersecurity framework
The National Institute of Standards and Technology (NIST) held in San Diego last week the third of four workshops to develop a comprehensive cybersecurity framework for critical infrastructure as required under an executive order signed by President Obama on February 12, 2013. NIST's goal with the workshop was to solicit feedback from nearly five hundred attendees to generate content for the preliminary draft framework, which is due in early October. Read More

Will CSOs become CROs in the future?
Few would deny the chief security officer role has evolved quite a bit in recent years. At many large companies, the heads of both physical and information security now report in to the same person, an enterprise CSO. The pace of change for the function is accelerating along with the ever-changing nature of threats. Read More

Cisco-Sourcefire union raises many product overlap questions
Industry watchers are bullish about the $2.7 billion Cisco buyout of security company Sourcefire, but they have plenty of questions about how these competitors in intrusion-detection and prevention (IDS/IPS) and next-generation firewalls (NGFW) will sort out significant product overlap. Read More


SLIDESHOWS

12 of the worst data breaches of 2013 so far

The Identity Theft Resource Center, which tracks disclosed data breaches, has recorded 301 for the first half of 2013.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. U.S. high-tech industry feeling the heat from Edward Snowden leaks

2. 10 competitors Cisco couldn't kill off

3. Chambers: Cisco will become the number 1 IT company

4. F5 data center firewall aces performance test

5. Black Hat: Top 20 hack-attack tools

6. Cisco spending $2.7B for Sourcefire

7. Happy birthday, OpenStack! Now change

8. US court renews permission to NSA to collect phone metadata

9. USA PRISM Plus, the perfect NSA photo-sharing app for those who have nothing to hide

10. Just like that, Android 4.3 is out, ahead of its release date


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: