Encryption top IT security initiative in 2009 Encryption seen as biggest IT security initiative in 2009, according to a Forrester Research survey. CA to buy data-leak prevention vendor CA Monday announced an agreement to acquire for an undisclosed sum data-leak prevention vendor Orchestria, boosting the software maker's security, privacy and compliance... Podcast: Security Trends for 2009 The true nature of the cloud, the quagmire of data leak prevention and virtual machine blind spots are some of the security issues that IT managers will face in 2009. Sophos CTO Richard Jacobs talks with Keith Shaw about the big picture for security in the upcoming year. (16:13) Twitter hit with phishing scam As has happened with virtually every other popular Web site over the past decade, it seems that Twitter is being used in a phishing scam. Microsoft Tells How It Missed Critical IE Bug Microsoft developers overlooked a critical bug in the Internet Explorer browser because of a lack of adequate testing tools and training, a company official acknowledged last month. Joshua Corman: someone to watch in '09 Corman, principal security strategist, IBM Internet Security Systems division, gets a nod for speaking candidly about the trouble facing enterprise security teams. Also: View a slide show. Oracle’s identity management guru is someone to watch Oracle aims to be the undisputed leader in identity and access management, and Amit Jasuja, vice president of product development for identity management, is leading the charge. Also: View a slide show. 2009 prediction: He who makes fully encrypted SD and Micro SD cards wins Cisco Subnet blogger Larry Chaffin writes: Why can’t someone fully encrypt a Micro SD Card or SD Card? You would think that if someone could do this, mass sell it at Best Buy it would be a hit. January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment