Security Squad: Beware of the mighty cyberattack

The SearchSecurity.com editorial team discusses whether a massive cyberattack will strike in 2008, the Sears spyware issue and NAC's continued evolution.

The SearchSecurity.com editorial team discusses whether a massive cyberattack will strike in 2008, the Sears spyware issue and NAC's continued evolution.

   Beware of the mighty cyberattack?  

  Program highlights:  

  • (0:49) Introduction

  • (5:31) Spyware at Sears.com: Customers that join the My SHC Community must voluntarily download software that tracks their Web usage.

  • (11:48) Anatomy of Storm: Will 2008 be the year of a massive cyberattack?

  • (19:03) Analysts have said that NAC and NAP may not be being adopted as quickly as vendors would have liked. Some vendors are taking a new strategy to address the slow growth.

      Program Links:  

  • Why is Sears tracking users' Internet activity?: Sears, which sells just about everything under the sun, has decided to get into the spyware business too.

  • Security Blog Log: Sears spyware illustrates perils of online commerce: As Senior News Writer Bill Brenner explains, every now and then a big company does something to remind us how easy it is to get burned when conducting commerce in cyberspace.

  • Storm, Nugache lead dangerous new botnet barrage: A new breed of malicious software is spreading on the Web. It's engineered to change on the fly, adapt to its environment and evade traditional defenses.

  • Vernier Networks quietly changes name, approach: One analyst says Vernier Networks' decision to re-launch as Autonomic Networks could be in response to slower-than-expected growth in the NAC sector.

  • Oracle owns up to patching problems: Database giant Oracle Corp. has faced mounting criticism of its security patching process during the last two years.

  • Experts: NAC not dead, just immature: One analyst suggests that the NAC market has grown too crowded and that smaller companies would either follow Vernier's lead or go away because far fewer enterprises are adopting the technology than vendors had initially expected or hoped.

  • Information Security podcasts: Visit SearchSecurity's podcast archive.

  • This Content Component encountered an error

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close