Friday, 1 April 2011

6 Super Security Freebies

Anti-Virus Software Driving You Mad? 5 Fight-Back Tips | Behind the Curtain of a Botnet Business

CIO Security

Forward this to a Friend >>>


6 Super Security Freebies
Simple security: In last year's roundup of best free stuff, the beta version of Microsoft Security Essentials 2 impressed us. Since then, Microsoft has officially released the utility to the public, and our admiration has only grown. With its combined antivirus, antispyware, and firewall protection, Security Essentials provides a solid layer of protection against the most common threats without hobbling your PC or nagging you with annoying update reminders. Read More


WEBCAST: Sogeti

Optimized Desktops: Your Most Powerful Productivity Tool
On April 28, 2011 at 10 AM EDT join this virtual briefing center to learn how to transform your PCs into business productivity machines and empower your people to drive success. Register Now

WEBCAST: Dell

Security: A Multilayered Approach
The resources in this Security KnowledgeVault provide expert advice on everything from creating a multilayered security strategy and deploying a more proactive fight against cybercrime, to realizing when it's time to stop going it alone and seek outside, expert help. Learn more.

Anti-Virus Software Driving You Mad? 5 Fight-Back Tips
Last week some Windows users struggled through unexpected PC slowdowns due to a security program bundled in with a Java update. Security programs still hog PC resources and pose annoyances -- but here's expert advice on how you can regain control. Read More

Behind the Curtain of a Botnet Business
Researchers gain access to one of the world's largest spam botnets, and find it's an operation that as organized and crafty as any successful corporation Read More

Security Manager's Journal: Helping in-House Developers
This week I found out that my company is developing software in-house. Until now I hadn't known that we were a software development shop, but I guess I shouldn't be surprised. Most companies that I've been with have developed their own software for one purpose or another. I only learned about this software development project when one of the programmers approached me to ask about the best way to store usernames and passwords in the application's database. Yes, that's right -- they built the authentication right inside the application, instead of calling out to an external authentication source. Read More

Top 5 Online 2011 Tax Scams
You may not want to think about your taxes until Tax Day on April 15, but online scammers are already plotting to separate you from your tax refund and your identity. Scams for the 2011 tax season include promises of tax credits for charitable donations to disaster relief in Japan, malware-laden Websites optimized for search engines, dangerous e-mail, and so-called 'likejacking' techniques found on the social network Facebook. Read More

Critical NASA Network Was Open to Internet Attack
Six NASA servers exposed to the Internet had critical vulnerabilities that could have endangered Space Shuttle, International Space Station and Hubble Telescope missions -- flaws that would have been found by a security oversight program the agency agreed to last year but hasn't yet implemented, according to a report by the agency's inspector general. Read More

BP Employee Loses Laptop Containing Data on 13,000 Oil Spill Claimants
The personal information of 13,000 individuals who had filed compensation claims with BP after last years disastrous oil spill may have been potentially compromised after a laptop containing the data was lost by a BP employee. Read More


WHITE PAPER: Dell

Elements of a Proactive Data Security Solution
See all the survey results along with more data security resources, including an expert Webcast outlining six vital security steps, in the security KnowledgeVault. Learn more.

Companies Pick and Choose Which Data Breaches to Report
One in 7 information technology companies have not reported data breaches or losses to outside government agencies, authorities or stockholders. Read More

McAfee's Website Full of Security Holes, Researcher Says
The McAfee.com website is full of security mistakes that could lead to cross-site scripting and other attacks, researchers said in a post on the Full Disclosure site on Monday. The holes with the site were found by the YGN Ethical Hacker Group, and reported to McAfee on Feb. 10, YGN says, before they were publicly disclosed to the security/hacking mailing list. Read More

Solo Iranian Hacker Takes Credit for Comodo Certificate Attack
A solo Iranian hacker has claimed responsibility for stealing multiple SSL certificates belonging to some of the Web's biggest sites, including Google, Microsoft, Skype and Yahoo. Read More

How to Move E-mail to the Cloud: 7 Planning Tips [Registration required]
Cloud computing providers can take enterprise e-mail off your to-do list, but how can you ensure a smooth transition? Forrester Research shares seven best practices. Read More

What a Cyberwar with China Might Look Like
If there is a cyberwar with China, as described in a new hypothetical scenario, it will not necessarily involve power grids being knocked offline and planes falling from the sky. Read More

Failure to Encrypt Portable Devices Inexcusable, Say Analysts
The continuing failure by most enterprises to encrypt sensitive data stored on laptops and other mobile devices is inexcusable, analysts said following BP's disclosure this week of a data compromise involving a lost laptop. Read More



Hot Picks for the Week

  1. CIO Resumes: Compare Yours to the Cream of the Crop
  2. 9 Best Social Networking Android Apps
  3. Google Apps: How We Convinced the C-Suite
  4. Switching Outsourcing Providers: 10 Tips
  5. Join CIO on Facebook! Images, Stories, RSS, Twitter and more!


Get more CIO peer perspective online
LinkedIn | Facebook | Twitter

You are currently subscribed to cio_security as info55383.news@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact CIO.com, please send an e-mail to online@cxo.com.

Copyright (C) 2011 CIO, 492 Old Connecticut Path, P.O. Box 9208, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@cxo.com. **


No comments:

Post a Comment