Search This Blog

Monday, August 30, 2010

DARPA takes aim at insider threats

  U.S. military wants to exert influence over private cyber infrastructure | Employees cranky about Web browsing restrictions
 
  Network World Security

Forward this to a Friend >>>


DARPA takes aim at insider threats
Looking to protect its massive networks from myriad insider security threats, the Defense Advanced Research Projects Agency rolled out a project that would let security personnel quickly detect and stop network insiders stealing or distributing military or government information. Read More


WHITE PAPER: Cisco

Security in the Cloud
This technology dossier contains four papers that address security considerations in cloud computing. It includes IDG Research results on what IT managers have to say about cloud security, executive viewpoints on blending cloud solutions to optimize security, and a strategy paper that addresses protecting data. Read now!

WHITE PAPER: NetGear

NETGEAR® Stream Scanning Technology
Security solutions must keep a company safe from the constant barrage of Internet-based threats without slowing down the speed of business. Where other technologies have failed, NETGEAR Stream Scanning architecture successfully achieves this balance. Learn more.

U.S. military wants to exert influence over private cyber infrastructure
The U.S. military wants to exert more influence over the protection of power grids, transportation networks and financial network systems, a Pentagon official says in a broad-ranging essay published in Foreign Affairs. Read More

Employees cranky about Web browsing restrictions
Workers who can't browse certain Web sites or access particular networks at the office are voicing their complaints, says staffing firm Robert Half Technology. Read More

Rootkit with Blue Screen history now targets 64-bit Windows
Updates to a new version of the malware dubbed Alureon, TDL and Tidserv are designed to infect 64-bit Windows PCs for the first time. Read More


WHITE PAPER: Watchguard

10 questions to ask before you buy an anti‐spam solution
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

Remains of the Day: We be scammin'
Seems like scams are all the rage lately, with one offering a free iPad--in exchange for personal information, naturally--on the loose in social networks, more mysterious iTunes account hacks, and there's a patent suit against Apple and a bunch of other companies. Not that that's a scam, of course. Ahem. Fortunately, the remainders for Thursday, August 26, 2010 come with a guaranteed genuine seal of approval. Read More

Defending the Internet: National Security v. Big Brother
In the wake of revelations that the US military network was compromised in 2008, and that US digital interests are under a relative constant threat of attack, the Pentagon is establishing new cyber security initiatives to protect the Internet. The Pentagon strategy--which is part digital NATO, part digital civil defense, and part Big Brother--may ruffle some feathers and raise concerns that the US Internet is becoming a military police state. Read More

Consumers more wary of online ticket websites
A new survey suggests that warnings over UK ticket scam websites could finally be starting to get through to ordinary consumers. Read More


WHITE PAPER: MessageLabs

Top Ten Web Threats and how to eliminat
This paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department. Read Now.

Why you should use your smartphone as your credit card
A few weeks ago, Network World ran a couple of articles about using smartphones as devices to transact credit and debit payments. One article said this would be "possibly dangerous." I completely disagree with that assumption. In fact, I say using your smartphone as your credit card is much more secure than using your regular old plastic credit card. Read on to learn why this is true. Read More

3 areas where FUD needs to stop
There is a new breed of animal appearing in the infosec community, according to Dr. Jimmy Blake, chief security officer for Mimecast, a cloud-services company based in London, and host of the blog Cloud Computing and Bad Behavior. The new breed is what he calls the "attention monger" (he actually used a more colorful word, but we toned it down for this article.) The attention monger is courting headlines with the media that add no real value to information security. Read More

1-in-4 worms spread through infected USB devices
Hard on the heels of a report that a USB drive was used to compromise U.S. military networks in 2008, a security company today claimed that 25% of all new worms are designed to spread through the portable storage devices. Read More

Foursquare Privacy Basics: 5 Tips to 'Secure' Your Check-Ins
It's hardly practical to believe there are "right" and "wrong" ways to employ social networking services like Twitter or Facebook. However, there are "smart" and/or "safe" methods of use, especially for location-based services (LBS) that identify your whereabouts at a given time, like popular social network/LBS Foursquare. Read More

Microsoft Applications Plagued by Binary Planting Flaw
Yesterday Microsoft released a security advisory addressing a bug in the way many applications are coded which could be exploited to attack Windows PCs. Microsoft was quick to point out that this new class of remote attacks is not related to specific vulnerabilities in Microsoft products, but that doesn't mean that Microsoft's applications are properly coded to avoid this issue either. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Cloud storage lives up to the hype
We tested five cloud-based storage services under real-world conditions. We set up accounts, connected with the vendor storage network, uploaded and downloaded files, measured performance and analyzed cost structures. Our conclusions are that cloud-based storage can save you money. And cloud-based storage can be fast. However, there are still security concerns that you need to be aware of.

Wireless networks and mobility quiz
iPhones and other handhelds bought for home use are infiltrating corporate networks, but there's a host of other wireless technologies that comprise a wave of mobile computing that is creating sweeping changes in business infrastructure. How well versed are you in the technical and not-so- technical details?

MOST-READ STORIES

  1. Air Force uses real birds of prey to protect its own predators
  2. Pentagon official details U.S military net hack
  3. Microsoft: 'We love open source'
  4. Apple in talks to bring $0.99 TV rentals to iTunes
  5. Social Security Administration to award massive network deal
  6. Windows and Linux servers grow at Unix's expense
  7. Security chiefs at home: No such thing as 'off duty'
  8. Report: Sun, Microsoft and Mozilla leave the most vulnerabilities unpatched
  9. Technology's Biggest Myths
  10. Geezer Quiz 2010
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: