Monday 25 April 2011

Survey: How much does Windows Patching burden you?

Sony yet to determine scope of PlayStation Network attack | US goes after some game-changing energy projects

Network World Security

Forward this to a Friend >>>


Survey: How much does Windows Patching burden you?
Network World wants to gauge the burden for enterprise companies of keeping Windows patched. Will you help? This survey will take about five minutes of your time and is anonymous. We are not gathering information about the identities of participants. If you have comments about the survey, or the topic of Windows patch management, you can submit them via the survey, or e-mail them directly to Network... Read More


RESOURCE COMPLIMENTS OF: Cisco

Cisco TechWise TV from Interop
Watch the Cisco Keynote Speakers and get new design tips and best practices from our technical experts from Interop. Thursday, May 12 thousands of IT professionals will come together for the industry's leading technology event. Register now for our Vegas event! Register Now

WEBCAST: Juniper Networks

Securing the Next-generation Datacenter
For the security teams responsible for safeguarding corporate IT assets, these trends present a host of challenges, necessitating several new capabilities and approaches to ensure ongoing, effective security Learn more!

Sony yet to determine scope of PlayStation Network attack
Sony has yet to determine the full scope of an attack on its PlayStation Network and Qriocity services that has left more than 75 million people without access for more than four days. Read More

US goes after some game-changing energy projects
Taking aim at developing some progressive energy technologies the US Department of Energy said it will write a $130 million check to develop five areas, including plants engineered to replace oil, thermal power storage, rare earth alternatives and what it calls the energy equivalent of an Internet router. More energy projects: Energy research projects were on fire in 2010 Read More

Office 365 Tips: Adding a Registered Domain Name
Adding your registered domain name to Office 365 lets you use your domain with the cloud service's e-mail, instant messaging, and Web hosting capabilities, and create new users. Here are detailed tips on how to get this done. Read More

Benefits and risks of nanotechnology
In the last of three brief articles looking at biologically-based or –inspired computing, Norwich senior Nicholas K. Logan, CEH, began with a discussion of genetic algorithms and then reviewed DNA-based computation. Today he examines some implications of tiny semi-autonomous, possibly self-replicating machines – artificial organisms constructed and perhaps programmed with tiny components. Read More


WHITE PAPER: Sophos

Attack of the PDF Documents
The PDF standard now supports JavaScript, along with tighter connections into user systems from the Adobe Reader program. This makes it very easy for virus writers to utilize scripting within PDF documents and security holes in the Reader software to load malware code and deliver this code onto computers. Read more

Watch out for the tinfoil hat brigade
The United States Department of Commerce recently announced the final release of the National Strategy for Trusted Identities in Cyberspace (NSTIC). While there was some discussion in the technical press, and a bit in the general press, there doesn't seem to have been nearly as much controversy as when the Secretary of Commerce, Gary Locke, brought it up at an event at the Stanford Institute for Economic Policy Research last January. Read More

'Byzantine Hades' shows China's cyber chops
Cyber espionage attacks from China are nothing new, but public awareness of the attacks is growing. Read More

Anonymous: 'For once we didn't do it'
Anonymous -- the group credited with taking down security vendor HBGary Federal and defending WikiLeaks by attacking websites of its perceived enemies -- says it has nothing to do with the network trouble crippling Sony's PlayStation site, despite having declared a cyber jihad against the company. Read More

Seattle police say 'wardrivers' are hitting small businesses
Seattle police are investigating a group of criminals who they say have been cruising around town in a black Mercedes stealing credit card data by tapping into wireless networks belonging to area businesses. Read More


WHITE PAPER: Quest Software

It's 9am. Do You Know What Your Directory is Doing?
In this new Quest Software white paper, you'll see how to get more information that native logging alone can't provide. See how you can get real time, centralized information, and how doing so maximizes Active Directory performance. Read More

Consumers remain wary of personal health records
Adoption of electronic personal health record systems, such as Google Health, Microsoft HealthVault and Dossia, remains relatively stagnant, mainly because most people haven't been exposed to the services, a new study finds. Read More

Facebook adds two-factor authentication
Just a day after security firm Sophos publicly took Facebook to task for lacking important security features, the social network has added some new security elements in what it says is an effort to "make Facebook a more trusted environment ." Read More

Cornell prof warns iPhone, iPad users: "We're selling our privacy"
Revelations that iPhones, iPads and other Apple iOS devices track your whereabouts have led a Cornell University professor to warn mobile device users about what they're sacrificing to use such gadgets. Read More

iPhone Location Tracking Draws Fire, Shrugs
Tech analysts differ on the seriousness of the iPhone location-tracking controversy. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a 5-day Microsoft Licensing Tricks class teaching negotiation tips; a Polycom system. From Cisco Subnet: 15 copies of Cisco Unity books. Enter here.

SLIDESHOWS

13 cool features of Office 365
Microsoft released the official beta version of Office 365 today, but we've been playing with it for a while now. Here are 13 cool features of the cloud-based service that combines Office, SharePoint, Lync and Exchange.

MOST-READ STORIES

  1. Asia out of IPv4 addresses
  2. Four things RIM's PlayBook got wrong
  3. Six Windows 7 nightmares (and how to fix them)
  4. Computer factories eat more energy than the devices they build
  5. Hacker 'handshake' hole found in common firewalls
  6. OpenFlow opens new doors for networks
  7. Red Hat becomes cloud service provider
  8. 10 must-have utilities for small networks
  9. Berners-Lee: Web access is a 'human right'
  10. Did you hear about the hacker who stole the open source code?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment