Friday, September 16, 2005

Continuous data protection finds supporters

All the week's news and views about Security, 09/16/05
_______________________________________________________________
This newsletter is sponsored by Tenebril, Inc.
FREE GUIDE: EVASIVE SPYWARE PROTECTION

Learn how you can successfully defeat evasive, hyper-mutating
spyware - spyware that antivirus, conventional antispyware, and
gateway solutions simply can't detect - with an innovative new
technology, Spyware Profiling. Download your FREE guide, Advanced
Tactics for Defeating Spyware.
http://www.fattail.com/redir/redirect.asp?CID=114192
_______________________________________________________________
Network World Technology Insider on Security
Is Encryption the Prescription?

Encryption won't solve all your security issues but these days
there is no excuse for not safeguarding your organization's
sensitive data. From Clear Choice product coverage to new
regulations and high-profile breaches, this Technology Insider
on Security covers it all. Click here to read now:
http://www.fattail.com/redir/redirect.asp?CID=114085
_______________________________________________________________

Network World's Security News Alert

Continuous data protection finds supporters, 09/16/05

Demand for continuous data protection is growing as more
businesses realize they not only need to back up the data on
their networks as changes are made but also be able to recover
that data quickly. Nearly every storage vendor has acknowledged
developing a continuous or near-continuous data protection
scheme for retrieving even the most recently saved data.
<http://www.networkworld.com/nlsecuritynewsal7129>

Interview: How security company ISS plans to let the good guys
in, keep the bad guys out, 09/15/05

Internet Security Systems Chairman, CEO and President Tom Noonan
says customers increasingly are looking for security platforms
that do two basic things: Let the good guys in and keep the bad
guys out. He spoke last week with Network World's Editor in
Chief John Dix and News Editor Bob Brown. Here is an edited
transcript of Noonan's thoughts on a host of topics.
<http://www.networkworld.com/news/2005/091505-iss-noonan.html?nl>

Identity federation: Is it time to move now?, 09/15/05

While there is high interest in identity federation, the
technology is still in flux and will likely be more expensive
and time-consuming to implement immediately rather than three
years from now, an identity and access management expert said
Thursday.
<http://www.networkworld.com/nlsecuritynewsal7130>

Secure endpoints key for mobile computing, 09/15/05

Computers and mobile devices using wireless networks or other
endpoints by company employees are posing increasing threats to
their organizations' computer systems, although there are ways
IT managers can reduce risk, according to an analyst Thursday at
the Gartner IT Security Summit 2005 in London.
<http://www.networkworld.com/nlsecuritynewsal7131>

McAfee unveils security gateways, 09/15/05

McAfee this week unveiled a line of multi-purpose Internet
security appliances intended for content filtering, taking its
first step into gateway-based anti-spyware protection.
<http://www.networkworld.com/nlsecuritynewsal7132>

Security company offers software insurance policy, 09/15/05

Citadel Security Software has developed a novel way to assure
customers that their products will perform as advertised. Backed
by insurance giant American International Group, they are now
offering customers a "software performance warranty," that will
cover costs related to security breaches.
<http://www.networkworld.com/nlsecuritynewsal7133>

UC Berkeley recovers stolen laptop with 98,000 names, 09/15/05

Campus police at the University of California, Berkeley have
recovered a stolen laptop that contained information of more
than 98,000 of the school's graduate students. The laptop's hard
drive had been wiped clean of information and then sold on an
Internet auction site, making it impossible to determine whether
or not the sensitive information it had contained was ever
accessed, the University said in a statement.
<http://www.networkworld.com/nlsecuritynewsal7134>

Paris Hilton hacker gets 11-month sentence, 09/14/05

Massachusetts juvenile has pleaded guilty to a January 2005
attack that ultimately exposed the cell phone address book of
U.S. socialite Paris Hilton to the Internet, according to
T-Mobile USA, the mobile phone provider whose servers were
compromised in the attack.
<http://www.networkworld.com/nlsecuritynewsal7135>

The top 5: Today's most-read stories

1. McAfee, Omniquad top anti-spyware test
<http://www.networkworld.com/nlsecuritynewsal6949>

2. The rise of the IT architect
<http://www.networkworld.com/nlsecuritynewsal7052>

3. Q&A: Microsoft's Allchin on Vista and beyond
<http://www.networkworld.com/nlsecuritynewsal7136>

4. Google hacking
<http://www.networkworld.com/nlsecuritynewsal6714>

5. Supermarket chain freezes Internet access
<http://www.networkworld.com/nlsecuritynewsal6679>
_______________________________________________________________
To contact:

Senior Editor Ellen Messmer covers security for Network World.
Contact her at <mailto:emessmer@nww.com>.
_______________________________________________________________
This newsletter is sponsored by Tenebril, Inc.
FREE GUIDE: EVASIVE SPYWARE PROTECTION

Learn how you can successfully defeat evasive, hyper-mutating
spyware - spyware that antivirus, conventional antispyware, and
gateway solutions simply can't detect - with an innovative new
technology, Spyware Profiling. Download your FREE guide, Advanced
Tactics for Defeating Spyware.
http://www.fattail.com/redir/redirect.asp?CID=114191
_______________________________________________________________
ARCHIVE LINKS

Security research center
Latest security news, analysis, newsletters and resource links.
http://www.networkworld.com/topics/security.html
_______________________________________________________________
FEATURED READER RESOURCE
IS IT THE NETWORK OR THE STORAGE THAT'S THE PROBLEM?

Midsize and larger businesses often find their IT topology has
become a complex mix of servers, networks and storage systems.
Many of these companies also route long-haul traffic over
fiber-based networks - metropolitan-area networks, WANs and
private optical networks. Who's responsible when a
storage-related problem occurs on a fiber network? For more,
click here:
<http://www.networkworld.com/nlsecuritynewsal7053>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

No comments:

Post a Comment