All the week’s news and views about Security, 04/14/09
The malicious worm affecting Twitter over the weekend has now
mutated and continues to invade the popular micro-blogging
network. Although Twitter is taking action against the problem,
security analysts fear that further mutations of the worm will
continue to wreak havoc on the network over the week.Read full
story
http://www.networkworld.com/nlsecuritynewsal191582
_______________________________________________________________
This newsletter is sponsored by HP
Storage Virtualization Guide
Check out Network World’s IT Roadmap on Storage virtualization.
Learn how to reduce the complexity of managing, backing up and
archiving data. Learn the differences between the three main
storage virtualization technologies which are in the data path,
out-of band and split path. Find out which technology is best
suited for your environment.
http://adserver.fattail.com/redir/redirect.asp?CID=296189
_______________________________________________________________
Network Management Solutions in your backyard. Answers are as close
as the IT Roadmap event in your area. You can ask questions,
compare quotes, and gain a year’s worth of direction in less than a
day. Coming to 10 cities in ’09 including Boston in May and Atlanta
in June. Qualify to attend free at
http://www.nww.com/rpgx.jsp?c=XU1PTB1012Z4303.
_______________________________________________________________
RELATED EDITORIAL LINKS
Weekend worms strike Twitter, teen admits responsibility
http://www.networkworld.com/nlsecuritynewsal191584 Twitter was
hit with at least three different worm attacks that started
Saturday and continued into Sunday, the micro-blogging service
acknowledged as it promised users it would review its coding
practices.
1 in 5 Windows PCs still hackable by Conficker
http://www.networkworld.com/nlsecuritynewsal191585 Although the
media blitz about the Conficker worm prompted a significant
number of enterprise users to finally fix a six-month-old
Windows bug, about 1 in 5 business computers still lack the
patch, a security company said Monday.
Botlab keeping an eye on spamming botnets
http://www.networkworld.com/community/node/40855 University of
Washington researchers have developed a prototype system called
Botlab that monitors botnets to gain insight into a major
generator of spam.
Does Social Networking Require User Policy Changes?
http://www.networkworld.com/nlsecuritynewsal191586 IT security
administrators have had a fairly easy case to make against such
social networking sites as Myspace in the past. Myspace in
particular tends to be a place for the mostly personal, and some
profiles are simply front companies for online mobsters and
malware pushers.
PCI security rules may require reinforcements
http://www.networkworld.com/nlsecuritynewsal191587 The PCI
standard, long touted as one of the private sector’s strongest
attempts to regulate itself on IT security, is increasingly
being slammed by critics who claim that the rules aren’t doing
enough to protect credit and debit card data.
Can the status quo threaten your LAN?
http://www.networkworld.com/nlsecuritynewsal191588 In times of
economic crisis people tend to seek the safety and security of
the status quo. “Doing what you’ve always done, and what
everyone else is doing, is the most prudent course,” goes the
thinking.
Security Tops IT Budget Priorities
http://www.networkworld.com/nlsecuritynewsal191589 Security is
on the minds of American companies and many are still making
room in their budgets to invest in IT security initiatives,
according to a survey released Monday by Robert Half Technology.
Trend Micro dishes out security smorgasbord
http://www.networkworld.com/nlsecuritynewsal191590 Trend Micro
Monday dished out a smorgasbord of endpoint security products
that put the focus on Trend’s cloud-based architecture and its
partnership with systems-management vendor BigFix.
RSA upgrades data leak prevention suite
http://www.networkworld.com/nlsecuritynewsal191591 EMC’s RSA
division Monday announced an upgraded version of its data-leak
prevention suite, adding over twenty policy templates for
recognizing personal identifiable information in countries
around the world, including Spain and New Zealand.
Podcast: Prepping for Tougher Health Data Rules
http://www.networkworld.com/nlsecuritynewsal191592 As part of
the recent stimulus bill, the HITECH Act will create standard
electronic health records for every American by 2014, as well as
introduce strict new rules for the protection of these health
records. John Linkous from eIQnetworks discusses the components
of the act and how IT can start preparing now for the new
standards. (10:12)
User education key to IT security: Microsoft
http://www.networkworld.com/nlsecuritynewsal191593 With the
release of its latest Security Intelligence Report, Microsoft is
encouraging its partners and customers to become more security
aware and educated, as new attack tactics are on the rise.
_______________________________________________________________
This newsletter is sponsored by HP
Storage Virtualization Guide
Check out Network World’s IT Roadmap on Storage virtualization.
Learn how to reduce the complexity of managing, backing up and
archiving data. Learn the differences between the three main
storage virtualization technologies which are in the data path,
out-of band and split path. Find out which technology is best
suited for your environment.
http://adserver.fattail.com/redir/redirect.asp?CID=296189
_______________________________________________________________
ARCHIVE LINKS
BONUS FEATURE
Accurately Troubleshoot your Apps. Optimize your application
troubleshooting efforts with the best practices described in this
whitepaper, “Application Troubleshooting Guide.” Eliminate finger
pointing between departments. Find out how to isolate the source of
application performance problems and what to look for when
troubleshooting. Get all of the details today.
http://www.nww.com/rpgx.jsp?c=XU1PTA1013Z4161 Download this
whitepaper now.
_______________________________________________________________
PRINT SUBSCRIPTIONS AVAILABLE
ParagonHost
The Spam Busters
Virtual Graffiti