Friday, January 20, 2012

Apple Mac-based security threats jumped in 2011

Will 2012 be the dawn of DNSSEC? | Zappos data breach response a good idea or just panic mode?

Network World Compliance

Forward this to a Friend >>>


Apple Mac-based security threats jumped in 2011
New Mac-based security threats jumped in 2011, but still remain far below that of Windows PCs, according to a posting by F-Secure Labs. Read More


RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
Infrastructure-as-a-Service (IaaS) is one of the fastest-growing cloud computing. However, cloud providers usage agreements squarely make the user responsible for protecting servers, applications and data. CloudPassage Halo is the award winning cloud server security platform that has everything you need to secure your cloud servers. Read More

RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant on-demand remote support with LogMeIn Rescue
Without pre-installed software, quickly connect to PCs, Macs, smartphones and tablets anywhere in the world. Get in, solve the problem, and be done in a flash. Plus, Rescue's SaaS-based platform means free upgrades and zero maintenance. Try it free today.

Will 2012 be the dawn of DNSSEC?
Will 2012 be the year when U.S. retailers, banks and content providers finally bolster their DNS systems with an add-on security measure that prevents Web site spoofing? That's what advocates of the security measure - dubbed DNSSEC for DNS Security Extensions - are hoping will occur. Read More

Zappos data breach response a good idea or just panic mode?
In acknowledging a data breach in which information related to as many as 24 million customers was stolen, online shoe and clothing retailer Zappos has taken assertive steps, including compelling customers to change passwords, plus temporarily foregoing 800-number phone service in an effort to redeploy customer-service representatives to respond to customer email. Read More

Security history: Nothing like an old-fashioned boot sector virus
It has been 26 years to the day when the computing world was introduced to its first virus: The Brain. Read More


WHITE PAPER: Riverbed

Forrester: IT Platform to Optimize and Consolidate
In this report, Forrester investigates the reasons why you should consider WAN optimization solutions as the best way to gain better IT performance, cost savings, and greater flexibility for your business. And it's also a smart network improvement investment over the long-term. Get the facts about WAN optimization in this study. Read now!

Clamor for cloud apps increases corporate data breach risk
Vendor analysis of network and application traffic shows poorly managed remote access tools and traffic flowing outside port 80 are rampant. Read More

RSA, unapologetic, looks to move beyond The Breach
Last April's RSA security breach was engineered by a nation-state whose ultimate goal was not to steal secrets about SecurID tokens but rather to use those secrets to compromise U.S. military contractors that protected their networks with the devices, RSA officials say. Read More

McAfee due to patch spam relay problem in cloud product
McAfee expects to patch by Thursday two problems with its SaaS Total Protection antimalware service, one of which lets an attacker use a computer as a spam relay. Read More


WHITE PAPER: NetIQ

First Industy-Wide BSM Maturity Benchmark Study
This first-of-its-kind benchmark study reporting the IT and Business maturity illustrating the business service management imperative today. The survey offers insight into the current and future state of the Business Service Management imperative across global organizations. Learn More

How smarter hypervisor use can lead to a 'big, big change' in security
To gain insight on the months ahead as they relate to IT attacks, malware, cloud security, and the impact of virtualization on security, we recently chatted with Simon Crosby, former CTO of Citrix Systems' data center and cloud business. Crosby recently founded a cloud security startup, Bromium, with Guarav Banga, former CTO and senior vice president at Phoenix Technologies, and Ian Pratt, chairman of Xen.org and co-founder of XenSource. Read More

Can employee-owned devices save companies money?
The "bring your own device" (BYOD) phenomenon is sweeping through the enterprise, and businesses such as Chicago-based design firm Holly Hunt have embraced it with gusto, offering stipends to employees to use their own mobile devices for work. Read More

Alcatel-Lucent, Arbor Networks partner on DDOS mitigation
Alcatel-Lucent is now offering a router with technology from Arbor Networks that defends against distributed denial-of-service attacks, the two companies said on Wednesday. Read More

NSA releases a security-enhanced version of Android
The National Security Agency (NSA) has released SE Android, a security-enhanced version of Android, which provides and enforces stricter access-control policies than those found in the popular mobile operating system by default. Read More

Chinese 'attack US DoD Smart Cards' with Sykipot Malware
A new strain of Sykipot is being used to attack US Department of Defense smart cards Read More



SLIDESHOWS

12 available devices to test drive Windows 8
Here are a dozen off-the-shelf devices that Microsoft says it uses in its labs to put Windows 8 through its paces. You, too, can buy one if you haven't already.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Inside Google at work and play
  2. 12 available devices to test drive Windows 8
  3. The 36 best iPhone games
  4. What do your gadgets really weigh?
  5. The best of CES 2012
  6. Will 2012 be the dawn of DNSSEC?
  7. RSA, unapologetic, looks to move beyond The Breach
  8. Fundamental Oracle flaw revealed
  9. 5 reasons Macs are gaining ground in the enterprise
  10. New Facebook attack targets e-cash users

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: