Search This Blog

Tuesday, December 11, 2007

Scary tech stories; Who's got the fastest firewall?

Security Alert Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Scary tech stories: How dangerous user behavior puts networks at risk

Denise Dubie By Denise Dubie
IT executives have always had to protect their networks from external attacks, but with data breaches increasing in frequency, more network and security managers are realizing negligent user actions could be the cause of many of their security nightmares. Read full story

Senior Editor Denise Dubie covers the technologies, products and services that address network, systems, application and IT service management for Network World. E-mail Denise.


SPONSORED BY NOMINUM
rule

Live Webcast: DNS creator shares best practices
Join DNS inventor Paul Mockapetris for a Live Webcast 2 p.m. Eastern/11 a.m. Pacific, Tuesday, Jan. 15, and learn best practices for deploying a secure, resilient and high-performing DNS architecture. Learn how to check your DNS setup in order to support fast-growing mission-critical networks. Register today for this Live Webcast.

rule
RELATED NEWS:

Review: Who's got the fastest firewall?, 12/10/07 When we tested firewall performance as part of in our UTM firewall test we focused on how well the products would push inspected packets along with other UTM features, specifically intrusion-prevention systems and antivirus, turned on. However, many enterprise managers will use these devices primarily just as firewalls, and might be curious how fast they’d operate without UTM slowing them down.

Are you wasting money buying antispyware software?, 12/07/07 Is there any point to using dedicated antispyware software? Originally it filled a need as adware pop-ups littered screens, unscrupulous spyware began tracking browsing behavior, and traditional antivirus programs proved unable to cope.

NSS Labs touts PCI certification program, 12/10/07 Security product-testing firm NSS Labs has started a certification program based on requirements associated with the Payment Card Industry security standard.

U.S. Secret Service busts $5.7 million Cisco scam on eBay California's Orange County Register is reporting that the U.S. Secret Service has busted a $5.7 million scam on eBay selling illegally obtained Cisco replacement parts.

What Cisco TrustSec Learned From Cisco NAC Failures Cisco's TrustSec framework learned a great number of lessons from the Cisco NAC framework failures of the past. Oh and the lessons they've learned! Let me count the ways, writes blogger Mitchell Ashley.

Microsoft Sharepoint spreads 'virally,' complications ensue, 12/07/07 The analyst firm CMS Watch is claiming the newest version of Microsoft’s SharePoint is spreading “virally” throughout enterprises, catching IT departments off guard and introducing risks related to uncontrolled content and regulatory compliance.

Stolen laptop had 268,000 blood donor IDs, 12/07/07 A laptop stolen during a recent blood drive contained sensitive information on 268,000 Minnesota-region blood donors, Memorial Blood Centers ...

Duke Law School applicants warned of possible ID theft, 12/06/07 About 1,400 Duke Law School applicants and two current students are being warned about identity theft concerns after hackers broke into the law school's Web site, where their Social Security numbers were stored in a connected database.

Lock down the data on your portable drives, 12/07/07 Barely a week seems to go by without a headline story on the latest laptop data breach--millions of veterans' files here, thousands of medical records there, and credit card numbers everywhere. But laptops aren't the only targets: The proliferation of portable USB hard disks and flash drives with huge capacity makes the loss or theft of critical data likelier than ever.

Ofcom rules that VoIP must do emergency calls, 12/07/07 The U.K. telecom regulator has, as expected, ruled that customers must be able to call the emergency services using VoIP.


HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

'07 ENTERPRISE ALL-STARS
'07 ENTERPRISE ALL-STARS Honoring outstanding technology projects.

SPONSORED BY NOMINUM
rule

Live Webcast: DNS creator shares best practices
Join DNS inventor Paul Mockapetris for a Live Webcast 2 p.m. Eastern/11 a.m. Pacific, Tuesday, Jan. 15, and learn best practices for deploying a secure, resilient and high-performing DNS architecture. Learn how to check your DNS setup in order to support fast-growing mission-critical networks. Register today for this Live Webcast.

rule

Holiday Tech Toys
Stumped on what gadgets and gizmos to give this holiday? Have no fear, Cool Tools' Keith Shaw is here. We do all of the heavy lifting of wading through hundreds of submitted technology products to find the very best holiday gift ideas. Click here to view our holiday gift guide: http://www.nww.com/PSA2_1210

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

12/11/07

TODAY'S MOST-READ STORIES:

  1. Microsoft pulls plug on potty-mouth Santa
  2. Open source software targets math programs
  3. Network coding: networking's next revolution?
  4. Cyberattack on national labs
  5. The nine worst Microsoft products
  6. Former Microsoft employee charged
  7. 2007 Cool Yule Tools gift guide
  8. Nortel thrashes Cisco wireless market share
  9. Cisco warns of bug in desktop software
  10. Vista's IPv6 raises new security concerns


TOP 100 OF 2007


Executive Guide The Security Treadmill

This Executive Guide offers interviews with leading, real-world security experts who tell you how to get inside users' heads, fight for a bigger security budget, and whether VoIP security issues are overstated or underrated, and much more. Review this informative guide today.

Click Here for More Information



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: