Wednesday, 16 March 2011

Intel targeting security in the cloud with McAfee

Do bots spell doom for online poker? | DHS chief Napolitano: Algorithms a big key in solving security, Big Data puzzle

Network World Security

Forward this to a Friend >>>


Intel targeting security in the cloud with McAfee
Intel on Tuesday said it will use assets acquired from McAfee to provide cloud security services to protect the growing number of mobile devices that face malware and cyberattack threats. Read More


RESOURCE COMPLIMENTS OF: Sophos

FREE Tool - Sophos Computer Security Scan
Scan up to 200 computers for viruses, spyware, Rootkits and other threats that your AV missed. Click Here

WHITE PAPER: Dell

Next Generation of Cybercrime
This executive brief sheds light on the risk of cybercrime by profiling several generations of cybercriminals, pointing out their methods and motivations. By understanding tactics from next-generation Pay-Per-Install and malware tech support to "point-and-click" cybercrime, business leaders will be better equipped to defend their organizations. Learn more.

Do bots spell doom for online poker?
It's difficult to imagine a different outcomePoker is my favorite pastime and I write about the Internet for a living, yet I have never played so much as a single hand online (at least not for money). The reasons are many - three kids and a mortgage primary among them - but The New York Times yesterday hit upon another that will do if those should ever prove inadequate: Bots. Read More

DHS chief Napolitano: Algorithms a big key in solving security, Big Data puzzle
Department of Homeland Security Secretary Janet Napolitano talks science and technology at Massachusetts Institute of TechnologyBetter algorithms to spot patterns and trends in the serious mass of information the Department of Homeland Security sees everyday is key to national security.  Read More


WHITE PAPER: CA

Defending Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

Security service on lookout for malware like ZeuS, SpyEye
Spotting notorious Trojans like SpyEye and ZeuS on compromised desktop computers is the goal of a new security service from Trusteer. Read More

Can Your Security Policy Handle IPv6?
The transition to IPv6 has finally become a reality. Is your security policy ready?The move to IPV6 got a shot in the arm with the February 3rd announcement that the last five /8 blocks of addresses were allocated by IANA, signaling that unallocated IPv4 addresses are now completely gone from the global pool. While this has NOT caused mass hysteria or prevented anyone from accessing World of Warcraft (a comforting thought to WoW junkies everywhere), it should be a wakeup call for... Read More


WHITE PAPER: HP

A Necessity for the Public Sector
This paper highlights 2010 survey results and reveals the key issues facing these organizations including the serious challenge of managing unstructured data while ensuring security and providing transparency in government. Read More!

What do security auditors really think?
What do auditors involved in making sure companies meet compliance requirements really think? For starters, companies don't care much about privacy and security, while encryption gets applied at a minimum to meet rules, according to a study of 505 security auditors by Ponemon Institute. Read More

Looking for vulnerable Web sites? Try schools
Educational institutions and social networks are the worst when it comes to leaving their Web sites exposed to known vulnerabilities, with health care and banks doing the best, according to a study by WhiteHat Security. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Perks drive up pay for tech CEOs
Many tech vendors have shied away from extravagant perks, but there are still plenty worth highlighting. Like a $1.5 million tab for home security. Or how about the $36,619 one company paid to reimburse its CEO for the taxes he had to pay on the $106,589 he gained by using company aircraft for personal flights? Read on to find out which tech CEOs enjoyed the priciest perks in 2010 and which ones went to work perk-free.

First look at Google Chrome 10
Google has released the stable version of Chrome 10 and users are now being automatically updated. As always, Chrome's new features focus on security, speed and simplicity, with greater JavaScript performance, sandboxing technology for Adobe Flash, password encryption and an easier-to-use settings interface. Here's a look at the new features.

MOST-READ STORIES

  1. Cell phones are 'Stalin's dream'
  2. Microsoft apologizes for using Japan disaster to market Bing
  3. 'Anonymity is authenticity,' Zuckerberg 'wrong'
  4. Quake damage to Japan cables greater than thought
  5. Happy Pi Day: More than 3.14... pictures of cool Pi creations
  6. Cisco releases first all-in-one security agent
  7. DHS chief Napolitano: Algorithms a big key in solving security
  8. iPad 2: Don't take it apart, or risk cracked glass
  9. IE9's final release is Monday. Will it make a difference?
  10. 15 best iPad apps for newbies

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment