Search This Blog

Thursday, January 10, 2008

Controlling outbound e-mail

Security Strategies Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Controlling outbound e-mail

M. E. Kabay By M. E. Kabay
OK, so you have good protection against inbound e-mail carrying viruses, worms, phishing attacks, scams and unwanted content in general. But what about controlling the enormous potential for data leakage and damage to your organization's reputation represented by outbound e-mail? Read full story

M. E. Kabay, PhD, CISSP-ISSMP is Program Director of the Master of Science in Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site.

MORE STORIESARROW


SPONSORED BY CA
rule

Getting on the VoIP Bandwagon
Learn from your peers. Download this Network World Executive Guide to read this compilation of user case studies. You will come away with ideas on how to improve your own VoIP deployment or have a better understanding of what not to do if you're just starting out. Find out more today. Download this Executive Guide now.

rule
RELATED NEWS:

Come fly the hacking skies Yikes! Boeing's 787 could be vulnerable to a hacker attack - someone at Boeing wasn't paying attention at their network design 101 class ... (Check out the news story: Boeing Dreamliner could be vulnerable to hackers)

Symantec: Gov't needs to take new cybersecurity steps, 01/07/2008 U.S. government agencies need to take additional steps to protect against cybersecurity problems after a series of congressional hearings and ...

Firms are still testing with live customer data, study warns, 01/09/08 A majority of organizations are creating unnecessary risks by using actual customer data for the development and testing of applications, according to a survey by Compuware and the Ponemon Institute.

Yahoo tests support for OpenID, 01/09/08 Yahoo appears close to implementing OpenID, a Web authentication standard that relieves people of the need to remember multiple passwords to log into different Web sites.

Data center robbery leads to new thinking on security, 01/08/08 Last October, a data center in Chicago owned by Web hosting and collocation vendor C I Host was robbed by two masked men, who pistol-whipped a lone IT staffer working the graveyard shift and then held him hostage for two hours while stealing computer equipment.

Storm worm, other botnets, kept spam levels high in 2007, 01/09/2008 Botnets helped keep spam output at consistently high levels last year, and global spam reached rates as high as 96% of all e-mail traffic during ...

Facebook 'Secret Widget' not our fault, Zango CEO says, 01/09/2008 The 'Secret Crush' malicious widget that tricks Facebook users into downloading spyware is not something dreamt up by Zango, the adware company's ...

Report: IRS information security still poor, 01/08/2008 The U.S. Internal Revenue Service continues to have "pervasive" information security weaknesses that put taxpayer information at risk, and it has ...


IT DEPARTMENT DEAD?
Nicholas Carr Nicholas Carr says utility computing will replace internal IT shops.

WHAT'S HOT AT CES?
CES International 2008 Take a look at the coolest technology straight from the showroom floor.

SPONSORED BY CA
rule

Getting on the VoIP Bandwagon
Learn from your peers. Download this Network World Executive Guide to read this compilation of user case studies. You will come away with ideas on how to improve your own VoIP deployment or have a better understanding of what not to do if you're just starting out. Find out more today. Download this Executive Guide now.

rule

Complimentary Subscriptions for IT Professionals
Sign up today and receive a yearly subscription to Network World magazine. Each week Network World is jam-packed with news, analysis, expert industry opinions and management advice that many network IT professional can't live without. Why not join them? Click here to subscribe: http://www.nww.com/PSA2_0102

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

01/10/08

TODAY'S MOST-READ STORIES:

  1. The IT department is dead, author argues
  2. Is gaming Google a gateway to crime?
  3. Top stories from the International CES
  4. Student antics with cell phones, iPods
  5. Sprint gets WiMAX soft launch underway
  6. The 15 best downloads of the year
  7. Nugache worm kicking up a Storm
  8. Mergers, acquisitions on the mgmt. front
  9. Cisco's virtual switch smashes records
  10. Can femtocells live up to the hype?

FEATURED BUYER'S GUIDE:
Client Management


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Strategies Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: