Friday, March 16, 2012

5 signs that you've lost control over your cloud apps

Hackers hit porn site Digital Playground | 40% of U.S. government Web sites fail security test

Network World Compliance

Forward this to a Friend >>>


5 signs that you've lost control over your cloud apps
CIOs are waking up to the reality that they've lost control over access to data stored in software-as-a-service applications purchased by other departments. Read More


RESOURCE COMPLIMENTS OF: Microsoft

Try Microsoft Office 365, free
Collaborate in the cloud with Office, Exchange, SharePoint, and Lync videoconferencing. Access, edit, and share documents. Starting at $8/user/month. Try it free.

WHITE PAPER: Oracle

Access to Sensitive Application Data
In this hands-on review, the SANS Institute Analyst Program examines Oracle Database Vault, which provides the capability to limit access of privileged users and DBAs to critical data and actions. Learn More!

Hackers hit porn site Digital Playground
A hacking group called The Consortium has claimed responsibility for the theft of personal data of more than 72,000 users of porn website Digital Playground. Read More

40% of U.S. government Web sites fail security test
Approximately 40% of federal government agencies are out of compliance with a regulation that requires them to deploy an extra layer of authentication on their Web sites to prevent hackers from hijacking Web traffic and redirecting it to bogus sites. Read More

7 hot security companies to watch
There's a rush in security startups looking to tackle everything from identity management to encrypting cloud data. Here are some of the latest companies worth keeping an eye on. Read More

Next up for DLP: The cloud?
Traditionally there have been two ways to host a data loss prevention security service: An on-premise application managed by the customer, or an on-premise application managed by the DLP supplier. BEW Global, a managed security service provider, has a third way: Through the cloud. Read More


WHITE PAPER: Tripwire

Responding to New Threats in More Complex IT Environments
As organizations today face the challenge of protecting their valuable data, they must balance that protection with giving business users and customers access to the data. Learn More!

CanSecWest browser-hacking contests offer bigger bounties, get small results
Contest organizers this year increased sixfold the prizes given out for successful zero-day browser exploits during the CanSecWest security conference, but wound up with just one more exploit to show for it. Read More

Amid doubts about cloud file-sharing services, enterprises operate their own
Cloud-based file-sharing services like Dropbox have become popular, but organizations with sensitive data say they're reluctant to turn it over to cloud services. Instead, they're buying file-sharing products they manage on their own for bulk file transfers among business partners. Read More

Kaspersky Lab spots malware signed with stolen digital certificate
Security firm Kaspersky Lab Thursday said it's identified a malicious program that appears to make use of a compromised Symantec VeriSign digital certificate issued to Conpavi AG, which is known to work with Swiss government agencies. Kaspersky says it has asked Symantec VeriSign to revoke the compromised certificates. Read More

In new attack on mobile handsets, fraudsters target one-time passwords
Two online banking fraud schemes are designed to defeat the one-time password (OTP) authorization systems used by many banks. Read More


WHITE PAPER: APC

Benefits and Risks of Energy-saving Modes of UPS Operation
This paper shows that eco-mode typically provides a reduction of 2-4% in data center energy consumption and explains the various limitations and concerns that arise from eco-mode use. Situations where these operating modes are recommended and contraindicated are also described. Learn More

Ukraine seen as a growing 'haven for hackers'
Ukraine's would-be major crackdown on cybercrime is increasingly looking like a bust. The result is the country becoming a haven for hackers, in the view of analysts, including some Ukraine security officials. Read More

Was LulzSec bust part of a play against Julian Assange?
Some observers see the LulzSec bust as an "intermediate step" in the pursuit of a more prominent fugitive: WikiLeaks founder and editor-in-chief Julian Assange. Read More

Avast suspends antivirus support company after mis-selling allegation
Antivirus company Avast has suspended its outsourced tech support after allegations that the Indian company carrying out the work has been trying to trick users into paying for unnecessary help. Read More

18 firms sued for using privacy-invading mobile apps
Facebook, Apple, Twitter, Yelp and 14 other companies have been hit with a lawsuit accusing them of distributing privacy-invading mobile applications. Read More

Digitally signed malware is increasingly prevalent, researchers say
Security companies have recently identified multiple malware threats that use stolen digital certificates to sign their components in an attempt to avoid detection and bypass Windows defenses. Read More



SLIDESHOWS

Useful security threat data advisory tools
Check out these browser-based tools to keep up on the latest cyber security threats.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Judea Pearl, a big brain behind artificial intelligence, wins Turing Award
  2. 10 ways to celebrate Pi Day
  3. Microsoft: Don't hate on IE 10
  4. Apple joins iPad trade-in bandwagon, offers competitive deals
  5. A look at China's cyberwar planning
  6. Alcatel-Lucent switch pushes Cisco, HP at the edge
  7. Looking for stolen iPad, police find 750 pounds of Meth
  8. Talent pool not big enough to meet cloud computing job demand
  9. Cisco rolls out its next generation fabric computing
  10. Indiana turns up 100G Ethernet research net

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: