Search This Blog

Thursday, November 19, 2009

The six greatest threats to US network security

The six greatest threats to US network security; FBI warns of spear phishing attacks on lawyers, PR firms
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by WatchGuard
rule

When Pressing Send Results In Compliance Issues
Protecting confidential data is serious business. Failure may result in fat fines and even jail time – not to mention brand damage. But take heart. WatchGuard easy-to-use, all-inclusive email and web secure content and threat prevention appliances provide complete data protection. This white paper offers a new perspective on bringing depth and breadth to your compliance strategy.

Click to continue

rule

Spotlight Story
Advice to beginners

The assigned topic was how students could best work effectively in software development groups. With the instructor's agreement, I decided to discuss some beliefs, attitudes and behavior that can help students entering the workforce for the first time as interns or new employees make the best of their opportunities. Read full story

Related News:

The six greatest threats to US network security
It's not a very good day when a security report concludes: Disruptive cyber activities expected to become the norm in future political and military conflicts.

FBI warns of spear phishing attacks on lawyers, PR firms
Employing uniquely spoofed subject lines designed to engage recipients with specific business content, the FBI today issued a warning to US law and public relations firms saying they are under attack by scammers using spear phishing e-mails with malicious payloads.

Risk Assessment Framework Helps Bank Secure Apps
With about a million customers, ICICI Bank manages close to Rs 50,000 crore (US$10.8 billion) in assets. A lot of that money is processed by about 550 bank applications that both its customers and about 10,000 of the bank's employees use. However, it was not always clear how open to vulnerabilities these applications were. It was not a state of affairs, the bank wanted to continue. "The bank wanted a high level of assurance for all its applications," says Pravir Vohra, Group CTO, ICICI Bank, "Within 18 months."

How Jindal Poly Films Fought Internet Threats
A part of the Rs 3,000-crore (US$650 million) B.C. Jindal Group, the 25-year-old Jindal Polyfilm is the largest manufacturer of PET film and BOPP films in the country with revenues of Rs 2,000 crore.

Heartland CEO: Encryption on track despite dispute
In a conversation with Computerworld today, Heartland CEO and Chairman Robert Carr blasted VeriFone's lawsuit and its suggestion that Heartland is incapable of supporting VeriFone customers.

Firefox 3.6 locks out rogue add-ons
Mozilla is adding a new lockdown feature to Firefox 3.6 that will prevent developers from sneaking add-ons into the program, the company said.

New security products underperform, says ICSA
Many security products simply do not work as advertised, or at least need a lot of tinkering to make them work, a report from the respected ICSA Lab has found.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Protecting Your Intellectual Property
Learn about the growing threat of insider data theft, the extent to which most companies are vulnerable, and how McAfee security products enable businesses to protect their most valuable asset-their data.
Click here.


Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More

 

November 19, 2009

MOST-READ STORIES

  1. Ahead of their time: Nine technologies that came early
  2. Verizon ups the smarm, mocks AT&T
  3. Left 4 Dead 2 themed holiday cards
  4. Cool Yule Tools
  5. Don't let your printer suck your wallet dry
  6. 2009's top 10 emerging enterprise technologies
  7. Are nations paying criminals for botnet attacks?
  8. Latest WebOS update for the Palm Pre lacks iTunes support
  9. Cray blows by IBM to regain supercomputing crown
  10. Did Cisco learn from its press mistakes from the last Cisco Live event?

Achieve Data Warehousing Performance with a Column-Oriented Database
The growing demand for deep-dive data mining, complex event processing and strategic business analytics puts increased demands on today's data bases and data warehouse. Learn how an alternative data base approach, which begins by storing data by columns instead of rows, has proven to meet today's exploding data warehouses.
Read this Paper Now!



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: