Security News AlertNetwork World's Security News Alert, 10/23/07Air Force flies toward Web application security, 10/22/07: Many of the U.S. Air Force’s mission-critical logistics applications, such as its cargo scheduling software, were developed to be used in a closed network environment. But now that the U.S. military is shifting toward greater use of the Internet, there’s heightened concern about making sure Web-based applications don’t get shot down from hackers exploiting software flaws. Palo Alto integrates firewall with Active Directory, 10/22/07: Palo Alto Networks is set to announce at Interop New York the ability to map firewall rules to individual users via integration with Microsoft’s Active Directory. Antispam start-up studies receiver’s reputation, 10/22/07: Turning the idea of sender reputation on its head, a new e-mail security company called Abaca Technology is announcing a gateway product that determines an inbound e-mail message’s potential to be spam based on how much unwanted e-mail the receiver has gotten in the past.
Podcast: Identity management helps take load off Sabre's legacy systems: For Sabre Holdings, identity management and security provisioning tools from Sun and Netegrity, have eased the burden on its mainframe processing systems and allowed the company to move to more open systems for supporting the 1 million peak transactions per hour it must process. Kurtis Holland, Principal, IT Security at Sabre Holdings, explains what steps went to into picking which tools to use and what you can do to avoid mistakes when implementing identity management in your own enterprise environment. (9:19) Hackers gain access to private hotel network using Cisco VoIP: Security experts at hackers conference explain how they used a Cisco VoIP device to hack into a hotel's corporate and financial network. Cisco warns of wired, wireless EAP security flaw: Cisco has issued a response to a Cisco Extensible Authentication Protocol (EAP) flaw noted by researchers at France Telecom. After theft, tech support call lands man in jail, 10/22/07: Here's a tip: if you steal a printer used to print driver's licenses, don't call the manufacturer asking for driver software. Juniper shrinking SSL traffic for the WAN, 10/22/07: Juniper Networks' WAN acceleration gear will soon support optimizing SSL traffic, making better use of corporate bandwidth by reducing the amount of bits it takes to transmit SSL traffic across wide-area links. Classroom breaches of top enterprises spur industry debate, 10/19/07: Penetration tests conducted by a group of non-IT students has set the cat among the pigeons in the security community, spurring analysts and security professionals to emphasize the importance of certified penetration tests. Study places value on sensitive data stored in laptops, 10/19/07: Most travelers carry little or no business information on their laptops, but the ones who do store an average of $525,000 worth of sensitive data, according to a survey contracted by iBahn, a provider of secure broadband services to some 2,100 hotels and conference centers in 22 countries. |
| Contact the author: Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment