Friday, August 13, 2010

IT security pros mentoring each other for career growth; Security blunders 'dumber than dog snot'

Security blunders 'dumber than dog snot' | 'Dangerous' iPhone exploit code goes public

Network World Compliance

Forward this to a Friend >>>


IT security pros mentoring each other for career growth
Information security is a tough field to break into and a growing group of information security professionals are finding that it's a whole lot easier if someone has their backs. Read More


WHITE PAPER: HP

IT Lessons from Grade School
Many of today's schools have a hodgepodge of outdated, nonstandard PCs, servers and printers, and little—if any—on-site IT support. Yet data collection and reporting requirements are driving school districts to upgrade and centralize their IT systems. Read Now

In this Issue


WHITE PAPER: Novell

Efficiently Delivering Enterprise-Class File-Based Storage
IDC: Read about the exponential growth in file-based storage. Learn how having intelligence on data stored can help storage managers make smarter decisions about data storage, protection, archiving, retention, and disposition. Read Now.

Security blunders 'dumber than dog snot'
At the 2010 USENIX Security Symposium, a vulnerability assessor reveals some of the more egregious examples of stupidity on the part of professionals who should know better. Read More

'Dangerous' iPhone exploit code goes public
Minutes after Apple issued a security update, the maker of a 10-day-old jailbreak exploit released code that others could put to use hijacking iPhones, iPod Touches and iPads. Read More

Revisions to credit card security standard on the way
The Payment Card Industry Data Security Standard 2.0 will be out at the beginning of September. The standard governs how businesses must guard sensitive cardholder information on their networks. Read More

Do you need network security and privacy loss insurance?
If your business manages personal information about health or finances, a security breach can cost millions. HITECH and other regulations not only apply fines, but they require disclosure and notification of those affected. In some cases, companies must pay for free credit reports too. These costs can range from $80 to $200 per compromised record. The problem for many companies is the sheer volume of information that can be compromised in a single breach. If you lose 5,000, 50,000 or 500,000 records, the math may mean bankruptcy. Fortunately, you can now get insurance to cover these risks. Read More

Have you had a vendor troubleshooting nightmare?
Ok, so I'm clearly still on my vendor kick. Last night I was lucky enough to sit on a troubleshooting call with one of our app teams and their vendor. They were having issues with DB performance. Typically when I get on these types of calls I prefer to just lurk instead of getting really involved because the vendors are usually so stupid I really have a hard time not getting upset. They also... Read More


WEBCAST: Infoblox

Learn 4 Concepts to Network Automation
Join this webinar to learn where to start introducing network automation into your organization so you can: • Address Hidden IT Costs • Support Key Initiatives • Achieve Operational Optimization • Apply IT Resources More Strategically View Now!

Early privacy GRC contenders
The privacy governance, risk and compliance niche is a subset of the IT GRC market and is characterized by privacy regulatory mapping, privacy assessments and data inventorying features. The products in the table below are the pioneers. Read More

Indian government to meet operators over the BlackBerry
Indian government officials plan to meet on Thursday with mobile operators to discuss access to BlackBerry data, according to informed sources. Read More

Demand Media a home to badware, researchers say
As Demand Media gears up for its initial public offering, anti-spam advocates and online crime fighters say that the company needs to clean up its act. Read More

Workarounds: 5 ways employees try to access restricted sites
Company policy may forbid access to certain web sites, but some employees try creative techniques to view them anyway. Here are five common workarounds and what security can do about them. Read More

Malicious Android app sends premium texts
A malicious app that racks up charges on handsets running Google Android has been discovered. Read More


WHITE PAPER: MessageLabs

Employee Web Use and Misuse:
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection. Read Now

Microsoft's 30-day forecast: Stormy exploits expected
Microsoft is warning customers that a record number of just-patched bugs will probably be exploited in the next 30 days. Read More

U.K. bank hit by massive fraud from ZeuS-based botnet
Security vendor M86 Security says it's discovered that a U.K.-based bank has suffered almost $900,000 (675,000 Euros) in fraudulent bank-funds transfers due to the ZeuS Trojan malware that has been targeting the institution. Read More

Tighten Your PC's Security With Encrypt Stick
Encrypt Stick (free and $40 versions) is one of the most secure and least intrusive ways to encrypt sensitive data. It leaves no footprint on your (or others') PC, because it resides on and runs off a flash drive, and will run on both PCs and Macs. It also uses polymorphic encryption (the algorithm will change for each device it runs from) that the company claims is 10 times faster than 256-bit AES, and even provides a nifty virtual keyboard to prevent keylogging of any sort. Read More

How to Protect Your Smartphone's Valuable Data
So you just lost your smartphone. It isn't the end of the world, but it sure feels like it. Read More

Tektronix Communications to buy Arbor Networks
Arbor Networks will be bought by Tektronix Communications for an undisclosed amount, the companies announced on Monday. Read More

Security metric techniques: How to answer the 'so what?'
You need to be ready when the boss responds to your presentation with a "so what?" At Metricon 5, the focus is on several security metric techniques to pull it off. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Supersize your WAN
Dual-WAN routers have come a long way. WAN connections are easier to establish, and all units we tested have configurable load balancing. The performance increase, not to mention the redundant Internet connections that all but guarantee uptime, should put these dual-WAN routers at the top of the shopping list for every small business that needs a router.

The recent history of governments vs. the Internet
Since the Web makes it far easier to access information than ever before, governments have had a harder time keeping the lid on information they don't want the public to consume and have often found themselves butting heads with tech companies who deliver Internet services or content. Here are some doozies.

MOST-READ STORIES

  1. Mobile deathmatch: RIM BlackBerry Torch 9800 vs. Apple iPhone 4
  2. Google CEO Schmidt: No anonymity is the future of the Web
  3. Everything you need to know about building solid, reliable networks
  4. 'Dangerous' iPhone exploit code goes public
  5. HP researcher claims to crack compsci complexity conundrum
  6. 10 of the world's funniest tech videos
  7. Microsoft's 30-day forecast: Stormy exploits unexpected
  8. AT&T Wireless chief blesses Verizon-Google proposal
  9. Security blunders 'dumber than dog snot'
  10. 'WiMAX 2' set to be finalized in November

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: