Search This Blog

Thursday, February 12, 2009

NSA identifies top 25 programming errors

Must-Read for professionals, educators and students
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Juniper Networks
rule

Live Webcast: A Simplified Data Center
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings. Register for this Live Webcast now.

rule

Spotlight Story
NSA identifies top 25 programming errors

M. E. Kabay By M. E. Kabay
The National Security Agency, working with MITRE Corp., SANS, and dozens of industry experts from many other organizations, has published a valuable list of the top 25 most dangerous programming errors. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Top 25 software screw-ups Most IT security woes, from software patching to cyberespionage and cybercrime, can be traced to the devastating effects wrought by the Top 25 programming errors made in software, according to a broad consensus of government and security firms.

Will Top 25 list of software errors rescue you from rotten software? Will the Top 25 worst software errors list released Monday be able to rescue customers from rotten software? That's the palpable hope from some security managers who have backed the government and industry effort to ...

Security Experts ID Top 25 Programming Errors A group of security experts and luminaries have created a list of the 25 most significant programming errors that can lead to serious software vulnerabilities.

A down economy increases threat of data walking out the door Moving into 2009, the number of layoffs and unemployed has multiplied as a result of the falling economy. Corporate data is at risk now more than ever and companies need to be sure they have reliable protection in place.

Your Identity: 'Costanza Style' Your identity is like George Costanza's wallet. Really. Think about it. Do you remember the classic Seinfeld episode? The one where George wouldn't give up his ever-expanding wallet filled with store credit cards, Irish money, a coupon for an Orlando Exxon gas station and several Sweet and Low packets. This, in spite of the obvious physical pain it caused and the security threat all of that imposed.

Largest coordinated ATM rip-off ever nets $9+ million in 30 minutes And Cisco Subnet blogger Jamey Heary explains how they did it.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Juniper Networks
rule

Live Webcast: A Simplified Data Center
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings. Register for this Live Webcast now.

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.

 

02/12/09

Today's most-read stories:

  1. Largest coordinated ATM rip-off ever nets $9+ million
  2. Shareholders say Microsoft squanders billions on R&D projects
  3. Evolution of PCs, Macs, Internet, routing, cell phones, Microsoft Windows
  4. Google's Latitude: Not new, but worrisome
  5. FAA network hacked
  6. A few clean words from the creator of Cursebird
  7. Nortel to shed shareholders meeting, more employees
  8. Kaspersky says Web hack 'should not have happened'
  9. Google adds ActiveSync to accommodate iPhone, Win Mobile
  10. IBM, Juniper join in cloud strategy


Product Guides
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Patch Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: