Friday, July 27, 2012

Tatu Ylonen, father of SSH, says security is 'getting worse'

Quirkiest Moments at 2012 Black Hat security conference | Getting the most out of IPS

Network World Compliance

Forward this to a Friend >>>


Tatu Ylonen, father of SSH, says security is 'getting worse'
Tatu Ylonen has garnered fame in technology circles as the inventor of Secure Shell (SSH), the widely used protocol to protect data communications. The CEO of SSH Communications Security -- whose crypto-based technology invented in 1995 continues to be used in hundreds of millions of computers, routers and servers -- recently spoke with Network World on a variety of security topics. (At the Black Hat Conference this week, his company is also announcing CryptoAuditor.) Read More


WHITE PAPER: Blue Coat Systems, Cisco Systems, and Citrix Systems

The 2012 Accelerating the Cloud Challenge
The Cloud is not magic. Enterprises still need to ensure that Service Levels are met and key to this are their Application Delivery solutions. Their WAN Optimization Controllers (WOCs) and Application Delivery Solutions (ADCs) play a key role in making their SaaS implementations and their deployment to the Cloud a success. Learn more.

WEBCAST: SAP

Automate Your Partners for Efficient E-Business
Join IDC's Maureen Fleming and SAP for an insightful Webcast on the different approaches companies are taking to B2B integration and how you can ask the right questions to reassess your B2B approach. Learn More

Quirkiest Moments at 2012 Black Hat security conference
From half-naked booth reps to colorful robots, it wasn't all about security on the exhibit floor and around the conference Read More

INSIDER
Getting the most out of IPS
Intrusion prevention systems — security tools designed to stop problems even before they crop up — have emerged as indispensable components of defense-in-depth security strategies. Read More

P2P 'Gameover ZeuS' seen as largest bank-theft botnet
It's the largest bank-theft botnet out there, and its peer-to-peer (P2P) design, credited to cybercrime gangs in Eastern Europe, is going to make it hugely difficult to take down, according to research put forward at the Black Hat Conference. Read More


WHITE PAPER: Silver Peak Systems, Inc.

WAN Optimization eGuide
In this eGuide, articles from Network World examine the maturing WAN optimization market, collect advice from experts and users on how best to implement these products, and look at new trends. Read on to discover how to make the most of WAN optimization in enterprise networks. Read now.

Study: Microsoft repeatedly ranks as top U.S. spammer
Microsoft has topped a list of biggest U.S. spammers for five out of the past 15 months, and for some of those months it ranked No. 1 in the world, according to a University of Texas study to flag the worst offenders in an effort to get them to improve their security. Read More

Black Hat makes light of accidental password-reset email
In explaining email, Black Hat organizer quotes Murphy's Law joke Read More

Email in security hot seat with rise of cloud, BYOD
For most enterprises it is not enough to make sure their own email platform is secure. If their suppliers are not equally secure, they can be as vulnerable to criminal hackers and data leaks from human error as the weakest link in their supply chain. Read More


WHITE PAPER: Fluke Networks

Optical Fiber Cabling for Data Communication
For this reason, Fluke Networks has created an enterprise-focused fiber troubleshooting guide to assist in ensuring: 1) proper assessment of cable installation quality, and 2) efficient troubleshooting to reduce the time spent identifying the root cause of a problem before taking corrective action to fix it. Learn More!

Black Hat: RSA service to zap apps pretending to be from your company
RSA Wednesday introduced a service at the Black Hat Conference to monitor far and wide for signs of phony corporate mobile apps, and to work with Google Play, Apple iTunes and other major app stores to remove them quickly. Read More

Researcher wows Black Hat with NFC-based smartphone hacking demo
At the Black Hat Conference in Las Vegas Wednesday, Accuvant Labs researcher Charlie Miller showed how he figured out a way to break into both the Google/Samsung Nexus S and Nokia N9 by means of the Near Field Communication (NFC) capability in the smartphones. Read More

Black Hat panel: Which do you trust less with your data, the U.S. government or Google?
To celebrate the 15th anniversary of the Black Hat Conference here, a panel of experts got together to expound on what they see as the privacy and security mess of our times, and they had plenty to say about the U.S. government, cyberwar and Google. Read More

Olympic gold: 15 free iOS and Android apps
Watch live, keep up with the athletes, test your knowledge of the games and more Read More

Olympic concerns on streaming video
With the London Olympics opening ceremony a day away, many companies are concerned that employees watching the Games over streaming video will slow or crash their corporate networks. Keith Shaw chats with Blue Coat Systems' Mark Urban about this. Read More



SLIDESHOWS

18 Notable Apple Alumni
While some with Apple ties are already well-known, others may be surprising to find on the list.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Tatu Ylonen, father of SSH, says security is 'getting worse'
  2. Black Hat panel: Which do you trust less with your data, the U.S. government or Google?
  3. Researcher wows Black Hat with NFC-based smartphone hacking demo
  4. Tool released at Black Hat contains 150 ways to bypass Web application firewalls
  5. Olympic gold: 15 free iOS and Android apps
  6. Wi-Fi and 3G hubs banned from Olympics
  7. Cisco layoffs this week part of 'Transformation Project'
  8. Earliest known photos of an Apple iPad prototype
  9. VMware snubs partner Cisco for network virtualization
  10. Microsoft needs to buy a vowel

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment