Friday, October 29, 2010

Sourcefire to crash next-generation firewall party; The Firesheep firestorm

The Firesheep firestorm | Burning question: How can security risks be mitigated in virtualized systems?

Network World Compliance

Forward this to a Friend >>>


Sourcefire to crash next-generation firewall party
Sourcefire Wednesday said it will enter the next-generation firewall market in mid-2011 with appliances that combine firewall/VPN functionality with intrusion prevention, Web URL and anti-virus filtering. Read More


WHITE PAPER: Iron Mountain

Skip the Disk
ESG predicts 40% of companies will leverage cloud-based data protection by year's end. See if your organization is ready to take advantage of avoiding tape and secondary disk, shifting the burden of complex backup processes , increasing availability of existing servers, and more, Read now

In this Issue


WHITE PAPER: Iron Mountain

Eliminate Tape Once and for All
Like many small to mid-size businesses, a Boston-based Toyota dealer was faced with tape capacity constraints, a shortage of physical space and limited IT resources. Learn how automated cloud data protection reduced tape backup costs by 70% and reduced storage needs of PC backups by 90% while providing bullet-proof disaster recovery. Read Now

The Firesheep firestorm
Taking Web security for granted?The Firesheep exploit -- a Firefox browser extension that lets an attacker snoop on a Wi-Fi connection to collect Website usernames and session IDs -- raises some interesting issues for Web security. So far, most of the focus has been on how individual users can protect themselves. But Firesheep's creator is trying to draw attention to the limited or complete lack of encryption support on popular Web... Read More

Burning question: How can security risks be mitigated in virtualized systems?
Virtualization poses storage, VM sprawl and security challenges. Read More

Juniper rolls out smartphone security suite
Juniper this week unveiled software, based on its recent purchase of sMobile, to protect mobile devices from security threats. Read More

Should teachers 'friend' students on Facebook?
Can school teachers "friend" their students on Facebook or other social-networking sites? And can they talk critically or at all about their schools and students in public forums? Read More

Upgraded retail security standard ignores mobile payments
Version 2.0 of the Payment Card Industry Data Security Standard is being released Thursday by the PCI Security Standards Council, which acknowledges that mobile payment technologies haven't been addressed yet. Read More

Stonesoft comes up with more ways to defeat intrusion prevention systems
Security vendor Stonesoft has come up with 26 more ways to beat most intrusion prevention systems without leaving a trace, making such advanced evasion techniques (AET) even more of a looming menace. Read More


WHITE PAPER: Iron Mountain

Online Backup and Recovery
IT professionals are increasingly looking to online backup and recovery services for server data protection. This White Paper helps companies recognize the major categories of service providers offering online backup and recovery specifically for servers. Read Now

.Com deemed the riskiest top-level domain, wrests title from Cameroon
The .com domain is the riskiest in terms of containing code that can steal passwords or take advantage of browser vulnerabilities to distribute malware, according to security vendor McAfee. Read More

SecTor 2010: Why security is the enemy of privacy
Some might expect security to be the answer for privacy protection, but it's often part of the problem. Tracy Ann Kosa, a privacy impact assessment specialist with the government of Ontario, explains why at SecTor 2010. Read More

Google Target of Misdirected Privacy Backlash
Google is under fire again for privacy issues related to the data it collects. Around the world, governments, privacy advocates, and individuals are concerned that Google may know too much and can't be trusted to protect the sanctity of the data it has acquired. More attention should be devoted to why the data was available to Google, though, rather than what it might do with it or whether it can be trusted to protect it. Read More

Symantec writes off $10 million after faulty AV activation
Symantec has been forced to write off US$10 million in revenue after a glitch in its sales system prevented some consumers from activating their Norton antivirus software at the time they bought it. Read More

Fighting botnets: Service rates reputation of IP addresses
Startup service provider ipTrust today said it was offering a program that lets businesses avoid botnets and infected machines by letting them know whether IP addresses are linked to suspicious behavior. Read More

Hackers exploit newest Flash zero-day bug
Adobe today confirmed that hackers are exploiting a critical unpatched bug in Flash Player, and promised to patch the vulnerability in two weeks. Read More


DOWNLOAD: BlackBerry

Get BlackBerry Enterprise Server Express for Free
BlackBerry Enterprise Server Express offers IT control and security features you can trust even for employees that choose to bring their own BlackBerry smartphones into your business. Download this free license to support up to 75 users on your existing Exchange Server. Learn More

E-voting: How secure is it?
Election fraud and vote tampering is as old as government. Before the American Revolution, most voting was done by voice. Voters would call out their pick for all to hear, which lead to intimidation and other nefarious tactics by those hoping to impact election results. The creation of the secret ballot was an improvement, but brought with it another host of possible modes of manipulation. In a quote that is now famous in American history, corrupt politician and Tammany Hall leader Boss Tweed often told constituents to 'vote early, and often.' Read More

A real-world case study of SCADA security
The clear message given in the report was that the water and power distribution networks owned and operated by this organization were vulnerable to serious service disruptions or degradations by moderately trained external personnel without access to internal networks or information. Read More

Microsoft quietly delivers Windows 7 SP1 release candidate
Microsoft has quietly released Windows 7 Service Pack 1 release candidate, slated to be the first and last RC version to be released before the final version ships early next year. Read More

Intego highlights iOS 4.1 iPhone security flaw
A new iOS 4.1 flaw has been spotted that could compromise Apple iPhone users. Read More

Level of security a 'top priority' for smartphone users
Four out of five people think 'level of security' is high priority when buying or using smartphones and tablet computers, according to a newly released global consumer study by Juniper Networks. Read More

Google Android security improves, but trails iPhone and BlackBerry
Android 2.2 improved security, but the iPhone and BlackBerry are still ahead of Google's smartphone OS. Read More

Fix a Windows Infection Using Linux
If you use Linux on your company's desktop or server computers, you're already familiar with many of the security advantages the open source operating system offers over its Windows and Mac rivals. What many people don't realize, however, is that Linux can also be used to rescue a computer that has been crippled by malware. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

The Google Android Quiz
Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies
Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.

MOST-READ STORIES

  1. Hey, you with the open Wi-Fi: You're an idiot
  2. Google now second-largest ISP, carries 6.4% of Internet traffic
  3. Steve Jobs' business card from 1979
  4. Oracle's Ellison vows to prove new HP CEO in on scheme
  5. Open source report: Ubuntu moves away from GNOME
  6. The Google Android quiz
  7. AT&T lagging while others lead on IPv6
  8. How to protect against Firesheep attacks
  9. Single mom of four wins Windows Phone 7 app contest
  10. Microsoft Server 2008 gets virtualization boost

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment