Search This Blog

Monday, May 21, 2007

Security Report: Microsoft, TCG get closer on NAC

Editor's note: InfoWorld will not be publishing
newsletters on Monday, May 28, in observance
of Memorial Day. This newsletter will be published
on Tuesday, May 29.


========================================================================
SECURITY REPORT

http://www.infoworld.com/
========================================================================
Monday, May 21, 2007

* Microsoft, TCG get closer on NAC
* Symantec: Chinese hackers grow in number, skills
* Alcatel-Lucent reports employee data lost or stolen
* Deepwater churns around unencrypted data
* Estonia recovers from massive denial-of-service attack
* Secunia: Firefox users more likely to install patches
* Symantec sues distributors for alleged fake software
* Amazon preps DRM-free music store

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT

ENDPOINT SECURITY: IT'S MORE THAN JUST ENCRYPTING BITS ON DISKS!

Securing data-at-rest requires enough flexibility to accommodate
today's workforce dynamics (all devices, users, and locations) while
consistently enforcing security rules-easily and painlessly-with no
compromise to user experience. Four requirements can help ensure
mobile data encryption as an integral part of your enterprise's
overall security processes. Download whitepaper.

http://newsletter.infoworld.com/t?ctl=178F23B:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
INFOWORLD ZERO DAY PODCAST

Covering business and IT strategies for securing the enterprise,
InfoWorld's Bob Garza covers anti-spam, anti-spyware, application layer
security, biometrics, digital identity, intrusion detection, malware and
more Sponsored by IronPort.

http://newsletter.infoworld.com/t?ctl=178F232:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --

========================================================================

MICROSOFT, TCG GET CLOSER ON NAC

The Trusted Computing Group (TCG) is tying its authentication software
standard to Microsoft's proprietary network access protection platform
-- a move that leaders in the network access control (NAC) segment tout
as a major step toward getting products made by different vendors to
work together.

http://newsletter.infoworld.com/t?ctl=178F22E:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4

========================================================================

SYMANTEC: CHINESE HACKERS GROW IN NUMBER, SKILLS

China's hacking scene appears poised for growth, as the number of
Internet users rise with a commensurate interest in criminal hacking and
government spying, according to a new Symantec study.

http://newsletter.infoworld.com/t?ctl=178F22C:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4

========================================================================

ALCATEL-LUCENT REPORTS EMPLOYEE DATA LOST OR STOLEN

A CD containing personal information about thousands of
Alcatel-Lucent employees and their dependants has been lost or
stolen, the company said on Thursday.

http://newsletter.infoworld.com/t?ctl=178F231:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT

ENDPOINT SECURITY: IT'S MORE THAN JUST ENCRYPTING BITS ON DISKS!

Securing data-at-rest requires enough flexibility to accommodate
today's workforce dynamics (all devices, users, and locations) while
consistently enforcing security rules-easily and painlessly-with no
compromise to user experience. Four requirements can help ensure
mobile data encryption as an integral part of your enterprise's
overall security processes. Download whitepaper.

http://newsletter.infoworld.com/t?ctl=178F23B:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
========================================================================

DEEPWATER CHURNS AROUND UNENCRYPTED DATA

The most sensitive and highly classified data communicated over the
nation's internal computer networks remains at risk for exposure,
according to key witnesses in the government's investigation into the
United States Coast Guard's Deepwater procurement program.

http://newsletter.infoworld.com/t?ctl=178F22A:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4

========================================================================

ESTONIA RECOVERS FROM MASSIVE DENIAL-OF-SERVICE ATTACK

A spree of denial-of-service (DOS) attacks against Web sites in Estonia
appears to be subsiding, as the government calls for greater response
mechanisms to cyber attacks within the European Union.

http://newsletter.infoworld.com/t?ctl=178F22B:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4

========================================================================

SECUNIA: FIREFOX USERS MORE LIKELY TO INSTALL PATCHES

Firefox users have something new to brag about. Security vendor Secunia
reports that users of the open-source browser are more likely to have
installed the latest security updates than Web surfers running Internet
Explorer or Opera.

http://newsletter.infoworld.com/t?ctl=178F22D:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4

========================================================================

SYMANTEC SUES DISTRIBUTORS FOR ALLEGED FAKE SOFTWARE

Symantec is suing eight businesses for allegedly selling counterfeit
software, the security vendor said Wednesday.

http://newsletter.infoworld.com/t?ctl=178F230:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4

========================================================================

AMAZON PREPS DRM-FREE MUSIC STORE

Amazon.com will open an online music store whose songs will not carry
copy-protection technology, the Seattle e-tailer announced Wednesday,
confirming a move that had recently been rumored.

http://newsletter.infoworld.com/t?ctl=178F22F:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4

======================================================================

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT

ENDPOINT SECURITY: IT'S MORE THAN JUST ENCRYPTING BITS ON DISKS!

Securing data-at-rest requires enough flexibility to accommodate
today's workforce dynamics (all devices, users, and locations) while
consistently enforcing security rules-easily and painlessly-with no
compromise to user experience. Four requirements can help ensure
mobile data encryption as an integral part of your enterprise's
overall security processes. Download whitepaper.

http://newsletter.infoworld.com/t?ctl=178F23B:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -

DAILY NEWS, DELIVERED TO YOUR COMPUTER, MP3 PLAYER OR CELL PHONE

The InfoWorld Daily podcast provides readers with
up-to-the-minute news and features that shape the world
of enterprise IT. Tom Sullivan reports on the leading news
and events that shape the today's IT community.

http://newsletter.infoworld.com/t?ctl=178F233:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4

======================================================================

ADVERTISE

To advertise, contact Kate_Hobbie@infoworld.com.

======================================================================

UNSUBSCRIBE/MANAGE NEWSLETTERS

To subscribe, unsubscribe or change your e-mail address for any of
InfoWorld's e-mail newsletters, go to:
http://newsletter.infoworld.com/t?ctl=178F234:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4

Contact Customer Service at: customerservice@infoworld.com

To view InfoWorld's privacy policy, visit:
http://newsletter.infoworld.com/t?ctl=178F236:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4

Copyright (C) 2007 InfoWorld Media Group.
501 Second St., San Francisco, CA 94107


This message was sent to: security.world@gmail.com

No comments: