All the week's news and views about Security, 06/13/05
_______________________________________________________________
This newsletter is sponsored by Cisco Systems
NETWORK SECURITY POLICY: BEST PRACTICES WHITE PAPER
Without a security policy, the availability of your network can
be compromised. Best practices toward a solid policy include:
preparation, prevention and response. This paper reviews each
area in detail and gives recommendations for assessing the risk,
implementing management practice, monitoring the network, and
reviewing and adapting lesson learned.
http://www.fattail.com/redir/redirect.asp?CID=106340
_______________________________________________________________
THE HOMEOWNER'S GUIDE
Expanding your home network? Helping your neighbors with theirs?
At Network Life you'll find everything you need to stay informed
and ready to meet the home network demands. Read about wireless
security for the SOHO network, building a media center, setting
up a Mac as a NAT server, and more. Click here:
http://www.fattail.com/redir/redirect.asp?CID=106393
_______________________________________________________________
Network World's Security News Alert
Two cases of lost data shine light on risks, 06/13/05
A pair of recent security breaches - one involving lost back-up
tapes containing financial information, the other in which
countless postings were deleted from thousands of online
bulletin boards - shows that data loss can happen in many
different ways for just about any reason.
<http://www.networkworld.com/news/2005/061305-ezboard.html?nl>
Outsourced security called battle tested, 06/13/05
Outsourcing corporate security is no longer risky business and
large organizations should hand off network monitoring and
security services as soon as possible.
<http://www.networkworld.com/nlsecuritynewsal2544>
Tivoli exec tackles security, 06/13/05
Arvind Krishna, vice president of provisioning and security
development for Tivoli Software Group, spoke with Network World
Senior Editor Denise Dubie about how IBM plans to bring security
to its management wares.
<http://www.networkworld.com/news/2005/061305-tivoli.html?nl>
Colubris rolls out wireless LAN controllers, 06/13/05
Colubris this week is unveiling the first of its wireless LAN
controllers aimed at letting its corporate customers centralize
security and management for its line of intelligent access
points.
<http://www.networkworld.com/news/2005/061305colubris.html?nl>
Multi-function boxes take off, 06/13/05
As the number of security technologies grows - firewall,
anti-virus, content filtering, intrusion detection and others -
some vendors suggest it makes sense to load all these platforms
on a single device to save capital and operational costs, and
perhaps even to improve security.
<http://www.networkworld.com/nlsecuritynewsal2545>
Microsoft plans mobile push, 06/13/05
For its Windows Mobile 5.0 handset software announced in May,
Microsoft plans later this year to offer an upgrade that will
provide customers push e-mail technology and improved security
management.
<http://www.networkworld.com/nlsecuritynewsal2546>
Opinion: Cleaning up after a Web session, 06/13/05
Winferno's PC Confidential cleans up data left behind.
<http://www.networkworld.com/nlsecuritynewsal2547>
Online businesses face credit card security deadline, 06/13/05
The deadline is fast approaching for companies that conduct
business online to have to comply with a common set of security
requirements outlined last year by major credit card companies.
<http://www.networkworld.com/news/2005/061305-pci.html?nl>
Not all agree on 'overhyped' security threats, 06/10/05
Two Gartner analysts released their list of the five most
overhyped IT security threats, with IP telephony and malware for
mobile devices making the list, but not all IT security vendors
agreed with the analysts' assessment.
<http://www.networkworld.com/nlsecuritynewsal2548>
Newsletter: Adtran releases integrated access device, 06/09/05
Adtran is coming out with an integrated access device that can
terminate IPSec VPN sessions, making it a flexible option for
businesses.
<http://www.networkworld.com/nlsecuritynewsal2549>
Newsletter: Cell phones for spies, 06/09/05
Anyone can use even an ordinary mobile phone as a microphone by
covertly dialing out; for example, one can call a recording
device at a listening station and then simply place the phone in
a pocket or briefcase before entering a conference room.
However, my friend and colleague Chey Cobb recently pointed out
a device from Nokia that is unabashedly being advertised as a
"Spy Phone" because of additional features that threaten
corporate security.
<http://www.networkworld.com/nlsecuritynewsal2550>
Newsletter: FullArmor aims to enforce security without
compromising ease of use, 06/08/05
FullArmor last week announced the latest version of its policy
management product IntelliPolicy for Clients 1.5. The release
addresses one of the thorniest security issues for Windows
administrators: how to create secure desktop configurations that
reduce vulnerabilities without impacting end-user productivity.
<http://www.networkworld.com/newsletters/nt/2005/0606nt2.html?nl>
_______________________________________________________________
To contact:
Senior Editor Ellen Messmer covers security for Network World.
Contact her at <mailto:emessmer@nww.com>.
_______________________________________________________________
This newsletter is sponsored by Good Technology
Wireless Mobility Special Report
Wireless mobility is always changing. Managing this change on a
corporate level requires both a technical understanding and
managerial control. Are security, integration, optimization,
and support considered? Download this report now to gain
important information for both technical and business decision
maker's on how to manage wireless mobility technology from the
top down. Click here:
http://www.fattail.com/redir/redirect.asp?CID=106712
_______________________________________________________________
ARCHIVE LINKS
Security research center
Latest security news, analysis, newsletters and resource links.
http://www.networkworld.com/topics/security.html
_______________________________________________________________
FEATURED READER RESOURCE
VoIP SECURITY
For the latest in VoIP security, check out NW's Research Center
on this very topic. Here you will find a collection of the
latest news, reviews, product testing results and more all
related to keeping VoIP networks secure. Click here for more:
<http://www.networkworld.com/topics/voip-security.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2
International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>
To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>
Subscription questions? Contact Customer Service by replying to
this message.
This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________
Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>
Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772
For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>
Copyright Network World, Inc., 2005
No comments:
Post a Comment