Search This Blog

Thursday, March 29, 2012

CIOs May Be Reluctant to Report Suspicious Activity

  International security team shoots down second Hlux/Kelihos botnet | Using Nagios to Monitor Your Clusters' Health
 
  Network World Security

Forward this to a Friend >>>


CIOs May Be Reluctant to Report Suspicious Activity
A consultant says CIOs may not feel comfortable reporting early signs of fraud Read More


WHITE PAPER: NetIQ

SANS Review of NetIQ Sentinel 7
A SIEM solution fully installed and capturing logs in under 15 minutes! Read how SANS analyst Jerry Schenk did it, and why he feels NetIQ Sentinel 7 is a great solution for the most pressing security problems facing enterprises today. Learn More!

WHITE PAPER: Oracle

Sustainable Compliance for the Payment Card Industry
This white paper explains the essentials of a PCI DSS compliance program, focusing on the critical but problematic areas that comprise much of the heart of the requirements. Learn More!

International security team shoots down second Hlux/Kelihos botnet
A team of security experts cooperating globally say they've disabled a large botnet of about 110,000 remotely controlled infected machines dubbed HLux.B/Kelihos.B by interfering in its peer-to-peer connections in a "poisoning" process to sinkhole them, cutting off the botnet's central control point. Read More

Using Nagios to Monitor Your Clusters' Health
You can enhance the Nagios network monitoring application with plugins. One especially useful plugin lets Nagios monitor the health of your cluster instead of that of individual hosts. Read More

Review: 7 password managers for Windows, Mac OS X, iOS, and Android
1Password and KeePass lead the field in features, flexibility, browser integration, and ease-of-use Read More


WHITE PAPER: Tripwire

Responding to New Threats in More Complex IT Environments
As organizations today face the challenge of protecting their valuable data, they must balance that protection with giving business users and customers access to the data. Learn More!

NASA faces serious challenges keeping the International Space Station relevant
The International Space Station might be a case of "if you build it they may not come" according to a government watchdog report out this week. The report states that the space agency has done a credible job of helping build the ISS (with a $50 billion investment) to last for years to come, but adds that there's a serious question as to whether or not it will be able to service the station and productively... Read More

New Google Account Activity lets you know what Google knows about you
If you're confused about what Google does and doesn't know about your online activity, don't worry: Google is letting you in on the secret. Read More

Avira becomes latest vendor to offer Mac antivirus software
German security company Avira has released free antivirus software for Apple Macs, joining a host of security software providers offering protection for OS X. Read More


WHITE PAPER: Radware

Protecting Critical DNS Infrastructure: What You Should Know
DNS is a critical Internet infrastructure as each web transaction involves a DNS service. An attack that disrupts these services will halt all other Internet-based services. Current infrastructure is vulnerable despite carrier and ISP protections. So what can you do to protect your business? Learn More

Microsoft leads seizure of Zeus-related cybercrime servers
Microsoft said on Monday it and several partners had disrupted several cybercrime rings that used a notorious piece of malicious software called Zeus to steal US$100 million over the last five years. Read More

Open source code libraries seen as rife with vulnerabilities
A study of how 31 popular open-source code libraries were downloaded over the past 12 months found that more than a third of the 1,261 versions of these libraries had a known vulnerability and about a quarter of the downloads were tainted. Read More

GAO goes undercover to expose military electronic parts fraud against DOD
The federal watchdog agency, the General Accountability Office, went undercover on the Internet to expose manufacturers actively willing to sell bogus military-grade electronics parts used in major weapons and aircraft systems of the U.S. Department of Defense. Read More

 
 
 

SLIDESHOWS

20 iPad business apps every CIO should want
iPad apps for sales forces, IT departments and more.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Google I/O sells out in a snap, angering those left out
  2. Steve Jobs wasn't a fan of the Siri name
  3. Cisco boosts telepresence system with new collaboration features
  4. Cisco's collaboration jab
  5. Arista 10G switch: Fast and flexible
  6. Firewall fail: A tale both funny and sad
  7. Microsoft apologizes after botched Windows Phone challenge
  8. Big news for IPv6: Akamai to launch service in April
  9. Is Google Drive coming soon?
  10. Blue Coat ready to execute new game plan in WAN optimization market
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: