Friday 15 April 2011

Security fragmentation needs to end

Did You Hear The One About The Hacker Who Stole The Open Source Code? | Hackers gain root access to Wordpress servers

Network World Security

Forward this to a Friend >>>


Security fragmentation needs to end
A new week, a new rash of attacks against security vendors, email marketers and banks. It would be easy to point fingers and laugh at the irony, especially in the case of security vendors, but that would be both petty and shortsighted. Read More


WEBCAST: Dell

Security: A Multilayered Approach
The resources in this Security KnowledgeVault provide expert advice on everything from creating a multilayered security strategy and deploying a more proactive fight against cybercrime, to realizing when it's time to stop going it alone and seek outside, expert help. Learn more.

WHITE PAPER: Dell

Elements of a Proactive Data Security Solution
See all the survey results along with more data security resources, including an expert Webcast outlining six vital security steps, in the security KnowledgeVault. Learn more.

Did You Hear The One About The Hacker Who Stole The Open Source Code?
Sounds like a dumb (take your pick - blonde, nationality, etc.) joke. The hacker who breaks in to steal the source code to an open source project. Pretty stupid you would think, huh? Reminds me of my honeymoon, I was ocean kayaking off the beach in Hawaii. I fell out of the boat and was floundering around on some sharp coral and stuff. I yelled to the lifeguard for help and he yelled back, STAND UP!... Read More

Hackers gain root access to Wordpress servers
Hackers have compromised several servers that support WordPress and may have obtained source code, according to the founding developer of Automattic, the company behind the popular blogging platform. Read More

Data Loss Prevention: Less Flip this Week
Last week I discussed Data Loss Prevention as a solution in search of a problem. This week I'll reduce the level of flip and review more detail deliverables of DLP solutions and some DLP vendors. Data leakage prevention technology tackles both data at rest residing within a network and specifically on disk storage and of course when data is in motion during telecommunications sessions. Vendors of... Read More


WHITE PAPER: Dell

Shelter from the Storm: Data Security for SMBs
Small and midsize businesses must deploy cost-effective strategies to improve security and minimize the impact of data breaches. The resources in this Data Security KnowledgeVault will help guide you through six vital steps to get out of reactive mode and build a foundation for a multilayered approach to data security. Learn more.

US takes out Coreflood botnet
The US Department of Justice and FBI said today they had filed a civil complaint, executed criminal warrants, and a temporary restraining order as part of what they called the most comprehensive enforcement action ever taken by US authorities to disable an international botnet. Read More

Barracuda Networks Silent On Data Breach
Quick blog here. I received an email from an industry source at 6:53pm yesterday (Monday April 11) with a link to a story about a SQL injection attack of Barracuda Network's website. I read about this story today and just checked the Barracuda Networks website at 5:42ET, Tuesday April 12. Guess what? There isn't a word about the breach on the homepage. No link to an explanation, no apology, nothing!... Read More

Microsoft quickens browser pace with IE10, goes for annual upgrades
A year after it debuted the first preview for the just-shipped Internet Explorer 9 (IE9), Microsoft on Tuesday kicked off its next browser, IE10. Read More


WHITE PAPER: Aerohive

Client Health Score Solution Brief
This solution brief provides an overview of Aerohive's new Client Health Score feature which cuts through volumes of data to show you the overall health of clients in an "at-a-glance" format, then enables you to drill down if you see a specific problem. Read now!

FAQ: What is OpenFlow and why is it needed?
Frequently asked questions about the OpenFlow protocol and its potential. Read More

Google denies lying about Apps' certification
Google on Monday denied an allegation by rival Microsoft that it lied about an important government certification for Google Apps for Government. Read More

Berners-Lee: Web access is a 'human right'
Two decades after creating the World Wide Web, Tim Berners-Lee says humans have become so reliant on it that access to the Web should now be considered a basic right. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a 5-day Microsoft Licensing Tricks class teaching negotiation tips; a Polycom system. From Cisco Subnet: 15 copies of Cisco Unity books. Enter here.

SLIDESHOWS

Internet2's Top 10 firsts and other achievements
As Internet 2 celebrates its 15th anniversary, here are 10 major achievements and firsts.

MOST-READ STORIES

  1. Hacker 'handshake' hole found in common firewalls
  2. U.S. takes out Coreflood botnet
  3. Berners-Lee: Web access is a 'human right'
  4. Microsoft learns lessons from Windows Phone update fiasco
  5. Apple looking to take on Netflix?
  6. VMware releases Cloud Foundry to set the PaaS cloud free
  7. IRS e-filing system turns 25
  8. Firewall security issues raised in report ignites vendors' ire
  9. Did you hear about the hacker who stole the open source code?
  10. Hackers gain root access to WordPress servers

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment