Friday, July 30, 2010

Data breaches often caused by configuration errors; Understanding Web 2.0 security at work

Understanding Web 2.0 security in the workplace | Open source Razorback project targets malware, zero-day exploits

Network World Compliance

Forward this to a Friend >>>


Verizon: Data breaches often caused by configuration errors
Hackers appear to be increasingly counting on configuration problems and programming errors rather than software vulnerabilities in order to steal information from computer systems, according to a new study from Verizon. Read More


WHITE PAPER: Riverbed

The CIO's New Guide to Design of Global IT Infrastructure
Is it possible to eliminate the impact of distance? This paper explores the 5 key principles successful CIOs are using to redesign IT infrastructure of any size. Learn how to be prepared to adapt your environment in a way that supports distributed employees, anytime anywhere collaboration and the need for business continuity during a disaster. Read now!

WHITE PAPER: Citrix

NetScaler vs. F5 View the Comparison
Tolly Performance Report: "Citrix NetScaler with nCore Outperforms F5 BIG-IP" shows you how Citrix NetScaler beat F5 in head-to-head tests ? providing 3X faster Web traffic, lower latency and higher throughput. Read now!

Understanding Web 2.0 security in the workplace
Check Point and Ponemon Institute asked where Web 2.0 security risks rank on the list of priorities Read More

Open source Razorback project targets malware, zero-day exploits
Sourcefire, best known for its Snort intrusion-prevention technology, Tuesday is unveiling a new open source project called Razorback that's designed to spot malware and especially zero-day exploits. Read More

Chapter 1: The Principles of Auditing
Read More

Massive check-fraud botnet operation tied to Russia
Check fraud is an old-fashioned kind of crime, but a criminal ring with ties to Russia is using modern cybercrime techniques, including botnets, online databases of financial information and check imaging archives, to run a highly automated, multi-million-dollar counterfeit-check operation. Read More


REPORT: Citrix

Gartner Research Note: Load Balancers are Dead
Gartner Research Note "Load Balancers are Dead: Time to Focus on Application Delivery" helps you understand how to replace your basic load balancing technology and focus on getting the highest availability, performance and security for your web apps. Includes key recommendations you can use. Read now!

Alleged Mariposa botnet hacker arrested in Slovenia
Slovenian police will hold a press conference on Friday to discuss the arrest of three men in connection the massive Mariposa botnet that was disabled late last year. Read More

Security suites: big protection, little fuss
Just a few short years ago, all a PC needed for protection was a basic antivirus program to guard against any malware that arrived via an e-mail attachment, embedded in a shareware application or piggy-backed on a floppy disk. Read More

Adobe joins Microsoft's patch-reporting program
Adobe and Microsoft are now working together to give security companies a direct line into their bug-fixing efforts. Read More

How Microsoft's Team Approach Improves Security
Microsoft announced new security initiatives and tools today at the Black Hat security conference in Las Vegas. The focus on partnership with other tech and security vendors helps identify threats and vulnerabilities more quickly, and demonstrates that Microsoft understands that effective security is a team effort. Read More


REPORT: Citrix

Magic Quadrant for Application Delivery Controllers
Citrix Positioned in the Leaders Quadrant for 2009 Application Delivery Controllers Magic Quadrant, Gartner Group. Read now!

ATM hack gives cash on demand
Barnaby Jack hit the jackpot at Black Hat on Wednesday. Twice. Read More

Black Hat: Most browsers can be made to give up personal data
All the most commonly used Internet browsers are vulnerable to exploits that can force them to cough up users' personal information that can be used to hack into bank accounts or set them up for other attacks, the Black Hat 2010 conference will be told this week. Read More

NAC decisions you need to make now
One important piece of a multilevel security defense for companies of almost any size is network access control (NAC), which lets you enforce policies for end-user machines. Read More

A striking disconnect between CSOs and hackers
Though I've been writing about Internet security for six-plus years, there's an interesting problem in the industry that I've only noticed in the last couple years: Security executives and the hacking community tend to live in different worlds. Read More

Cybercrime costs a business $3.8 million/year, study finds
A new study of 45 U.S. organizations found that cybercrime -- including Web attacks, malicious code and rogue insiders -- costs each one of them $3.8 million per year, on average, and results in about one successful attack each week. Read More

Google Apps Project Delays Highlight Cloud Security Concerns
Google led a coup against Microsoft to win the contract with the city of Los Angeles to provide messaging and productivity software for roughly 30,000 city employees. Nine months later, though, implementation is behind schedule as Google and the city of Los Angeles address security concerns with the cloud-based services. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: Apple iOS 4 vs. Android 2.2
Apple's iOS has been wowing users for four years in the iPhone and now the iPad. Available in smartphones and now tablets from various vendors going on two years, Google's Android has proven itself to be a strong contender that has the only real chance to surpass iOS.

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. Apple grants ABC access to its secretive "black labs"
  2. WPA2 vulnerability found
  3. Cisco study warns against "FarmVille"
  4. Is Sprint losing its WiMAX/4G gamble?
  5. MIT design could speed up the Internet
  6. Certified lies: Big Brother in your browser
  7. Avaya stares down Microsoft, Cisco
  8. Black Hat too commercial for you?
  9. Mobile deathmatch: Apple iOS 4 vs. Android 2.2
  10. Should you even bother looking at Windows Phone 7?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: