Search This Blog

Tuesday, May 28, 2013

US Department of Justice lays out cybersecurity basics every company should practice

  Google to lengthen SSL encryption keys from August | Twitter's two-factor authentication implementation can be abused, researchers say
 
  Network World Security

Forward this to a Friend >>>


US Department of Justice lays out cybersecurity basics every company should practice
The mantra is old, grant you, but worth repeating since its obvious from the amount of cybersecurity breaches that not everyone is listening. Speaking at the Georgetown Cybersecurity Law Institute this week, Deputy Attorney General of the United States James Cole said there are a ton of things companies can do to help government and vice-versa, combat cyber threats through better prevention,... Read More


WHITE PAPER: Stonesoft Corporation

Stonesoft Firewall Appliances for Demanding Environments
To keep up with today's sophisticated threats and complex network traffic, a first generation firewall will not do. View now

RESOURCE COMPLIMENTS OF: LogMeIn

Powerful and secure remote support with LogMeIn Rescue
For companies that want to compete in their industry, improving the customer experience is a top priority. To do that, having an on-demand remote support solution is essential. That's why companies around the world choose LogMeIn Rescue to provide powerful, secure support of any device, anytime, anywhere. Rescue offers a simple, reliable interface packed with all the features technicians want. Check out LogMeIn Rescue to learn more and start your free trial today.

Google to lengthen SSL encryption keys from August
Google plans to upgrade the security of its SSL (Secure Sockets Layer) certificates, an important component of secure communications. Read More

Twitter's two-factor authentication implementation can be abused, researchers say
Twitter's SMS-based, two-factor authentication feature could be abused to lock users who don't have it enabled out of their accounts if attackers gain access to their log-in credentials, according to researchers from Finnish antivirus vendor F-Secure. Read More


WHITE PAPER: Dell Inc.

2013 Next Generation Firewall Security Value Map
Read this case study to learn how ZapFi enabled comprehensive gateway security and granular application intelligence for large-volumes of wireless and VPN traffic. In addition, ZapFi eliminated overhead and latency, by integrating Dell SonicWALL SuperMassive, TZ Series and Global Management System (GMS) solutions. View Now

PayPal denies teenager reward for finding website bug
A 17-year-old German student contends PayPal has denied him a reward for finding a vulnerability in its website. Read More

Fight for your privacy or lose it, says Eric Schmidt
When you think about people advocating privacy, it's doubtful that Eric Schmidt, Google Executive Chairman, springs to mind. Just the same, Schmidt told The Telegraph, "Whenever there's a conflict, the logic of security will trump the right to privacy." Read More


WHITE PAPER: Cisco Systems

Getting the Most Out of Your Next-Generation Firewall
Trends such as BYOD and the adoption of social media and other grey applications as legitimate business tools have had profound effects on organizations of all sizes. Read Now

Layered defenses largely fail to block exploits, says NSS
Security experts have long touted a layered approach to cyber security as the most effective way to thwart network intruders, and the strategy is most effective when companies use a mix of vendors and security products, NSS Labs found. Read More

Researchers find unusual malware targeting Tibetan users in cyberespionage operation
Security researchers from antivirus vendor ESET discovered a piece of cyberespionage malware targeting Tibetan activists that uses unusual techniques to evade detection and achieve persistency on infected systems. Read More

10 Popular iPhone Apps - Blacklisted!
BYOD programs may come with the restriction of apps that consume too much data, risk malware or distract workers. Here are 10 iPhone apps that you're likely to find on a blacklist. Read More

 
 
 

SLIDESHOWS

20 milestones in Ethernet's first 40 years

Reviewing the highlights of Ethernet's first four decades.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Twitter's 10 most antisocial celebrities

2. 9 super useful subreddits network pros should follow

3. Microsoft sacks iPad in Windows 8 ad, join forces with NFL

10. Researchers find more versions of digitally signed Mac OS X spyware

8. Getting the most out of flash storage

9. Ethernet filters out porn, plus 9 other facts we learned from Bob Metcalfe

7. Sun's stars: Where are they now?

6. iPhone 6 rumor rollup for the week ending May 10

5. Juniper invests in cloud and big data

4. DHS warns employees that years-old database hole puts their privacy at risk

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

1 comment:

Anonymous said...

generic propecia propecia young men - reviews on generic propecia