Search This Blog

Tuesday, July 26, 2011

Confusing array of security job titles complicates Pentagon cyber warrior strategy

The 5 biggest IT security mistakes | Intel acknowledges SSD 320 bug, working on firmware upgrade

Network World Security

Forward this to a Friend >>>


Confusing array of security job titles complicates Pentagon cyber warrior strategy
As the US Department of Defense wrangles with cybersecurity and organizes for potential online warfare, it faces a number of big challenges - not the least of which is managing to get the right people in the right jobs. But with the DoD such a task isn't so easy. Read More


WHITE PAPER: Riverbed

Application-Aware Network Performance Management
Riverbed® Cascade© stacks up extremely well against the competition. How well? In particular, Cascade outperforms other application-aware network performance management solutions in such important areas as product strength and cost efficiency. Read Now.

WHITE PAPER: Blue Coat Systems

Why You Can't Ignore WAN Optimization
WAN optimization reduces overall infrastructure costs and creates a better application experience for users. Nearly all Fortune 100 companies trust Blue Coat and enjoy: • 99% reduced bandwidth consumption • Intelligence to optimize and control video and Web applications • Accelerated cloud-delivered applications Read now!

The 5 biggest IT security mistakes
Like cleaning the windows, IT security can be a thankless task because they only notice when you don't do it. But to get the job done in the era of virtualization, smartphones and cloud computing, you've got to avoid technical and political mistakes. In particular, here are five security mistakes to avoid. Read More

Intel acknowledges SSD 320 bug, working on firmware upgrade
Intel on Sunday acknowledged that a bug could cause its SSD 320 solid-state drives to fail, and said a firmware upgrade is on its way to address the problem. Read More

Want Real Wi-Fi Security? Aruba's Got It
Having worked in government high-security environments, two things come to mind: how seriously security needs to be taken here (mistakes are simply not allowed), and how wireless LANs to date have been forbidden in most of these applications, even with cumbersome and expensive external crypto units. Read More


WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

Heathrow to install facial recognition scanners
The U.K.'s largest airport, Heathrow, will install facial recognition scanners by September for international and domestic passengers to prevent illegal immigration in the country. Read More

Google fixes flaw that scrubbed websites from search index
Google has disabled a feature that could allow people to remove websites from its search index following a problematic discovery by an astute observer. Read More

20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
From IT geeks winning millions to Google mush-brain syndrome, 2011 is shaping up to be one wacky year Read More


WHITE PAPER: F5

Magic Quadrant for Application Delivery Controllers, 2010
The market for ADCs is consolidating. However, innovation continues, especially among some select smaller players. Although there are clear leaders in the ADC market, enterprises should focus their buying decisions on a vendor's ability to support specific application requirements. Learn more!

UnboundID releases SCIM toolkit beta
One place you could have gone to escape the recent heat wave that encompassed most of the U.S. was Keystone, Colo., where the afternoon temperatures barely reached the mid-70s F (while here in the mid-Atlantic we were stretching from the mid-90s to 100 or so). And while you were there you could have attended the Cloud Identity Summit, ably organized by Ping Identity's Andre Durand. Read More

Wham Bam Google Ban: No Pseudonyms on Google Plus Profiles
For a social network that was supposedly "privacy friendly" with "circles" this time around, Google is ticking off huge groups of people with its profiles from hell policy. Read More

The problem with weak passwords and hijacked Hotmail: 'My friend's been hacked!'
When you think of Microsoft, most folks don't think "sense of humor." Yet the engineers behind Hotmail have combined a bit of humor with security by adding a Mark As drop-down option of "My friend's been hacked!" Read More

Anonymous, Hackers, Citizens: Know Your Rights!
After the FBI executed more than 35 search warrants and arrested 16 for "alleged roles in cyber attacks," aka possibly members of Anonymous who launched DDoS or other hack attacks, I stumbled upon an interesting ASK Reddit thread which was supposedly posted by a parent of a 13-year-old who was a target of the FBI raid. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
From IT geeks winning millions to Google mush-brain syndrome, 2011 is shaping up to be one wacky year.

MOST-READ STORIES

  1. 10 wicked off-the-cuff uses for retired NASA space shuttles
  2. 15 incredibly useful (and free) Microsoft tools for IT pros
  3. 10 technologies that will change the world in the next 10 years
  4. 20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
  5. iPhone 5 rumor roll-up for the week ending July 22
  6. Analog Gear That Makes Us Nostalgic
  7. Adobe software breaks down on Mac OS X Lion
  8. Is wireless making us nuts?
  9. Alcatel-Lucent confirms Enterprise business may be sold
  10. Google: Sun offered to license Java for $100 million

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: