Friday, March 27, 2009

Expert cites "major problem" with security policy compliance

SecureWorld Boston speaker calls for going back to basics, moving toward automation
Network World logo

Compliance Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by HP
rule

HP 5 Questions to Ask about Network Automation
Visibility into the global network is key to maximum uptime. You can't fix what you can't see and having a view into the global network ensures the ability to; identify and resolve problems quickly, prevent configuration mistakes, enforce best practices and manage the network from a central location. Learn what to ask when evaluating your network management system. Read this whitepaper today.

rule

Spotlight Story
Expert cites "major problem" with security policy compliance

Bob Brown By Bob Brown
Attendees at this week's SecureWorld Boston conference got a stern talking-to Wednesday morning: Keynoter Charles Cresson Wood said organizations need to get their information security policies in order or risk going down the tubes Read full story

Related News:

Visa pilots new payment card security initiatives Acknowledging the need for controls that go beyond those offered by the Payment Card Industry (PCI) Data Security Standard, a senior Visa Inc. executive Thursday described two new initiatives to reduce payment card fraud being tested by the company.

H-1B lottery approaches, experts mull TARP effect Economic conditions could lessen demand for H-1B visas as U.S. government officials work to limit abuse of the program.

Biggest mistake for IPv6: It's not backwards compatible, developers admit The Internet engineering community says its biggest mistake in developing IPv6 - a long-anticipated upgrade to the Internet's main communications protocol - is that it lacks backwards compatibility with the existing Internet Protocol, known as IPv4.

IETF to explore new routing technique The Internet Engineering Task Force (IETF) is forming a new working group to address scalability issues in the Internet¿s routing system caused by companies splitting their network traffic over multiple carriers, a practice called multihoming.

Google: IPv6 is easy, not expensive Google engineers say it was not expensive and required only a small team of developers to enable all of the company’s applications to support IPv6.

India Inc. gets White House meeting on H-1B visas A delegation from one of India's largest business groups visited Washington last week to make a case for the H-1B visa program, among other political topics. And it was a group with enough clout to meet with top White House officials.

Standards Compliant IE8 + IE7 Compatibility Mode: Blessing or Curse? Blogger Mitchell Ashley opins abuot Microsoft heralding IE8 as the first standards compliant browser. But IE 8 has to live in a world that isn’t fully web standards compliant, partly because of IE’s own non-compliant and “unique feature” past sins. Implementation of web coding standards seem about as precise as many network protocols; the details, like the devil (as they say), are in the details of vendors’ implementations.

Broadcom unveils 10G chips that use SFP+ Broadcom this week introduced two 10 Gigabit Ethernet chips that support the SFP+ standard.

ANSI Panel to Standardize Identity Theft Tracking Know the difference between 'identity theft' and 'identity fraud'? Don't feel bad if you don't. Even within the security industry, within the government, and within law enforcement, the terms are used interchangeably although they are in fact different.

No business case for IPv6, survey finds Business incentives are completely lacking today for upgrading to IPv6, the next generation Internet protocol, according to a survey of network operators conducted by the Internet Society (ISOC).

Comply! Compliance with regulations is a bear, but there are tools to get you there. Our revamped Product Guide can help you sort through them all.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by HP
rule

HP 5 Questions to Ask about Network Automation
Visibility into the global network is key to maximum uptime. You can't fix what you can't see and having a view into the global network ensures the ability to; identify and resolve problems quickly, prevent configuration mistakes, enforce best practices and manage the network from a central location. Learn what to ask when evaluating your network management system. Read this whitepaper today.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


What you need to see all 7 layers
Get all the tools you need to see all 7 layers of your network. Fluke's OptiView Analyzer combines protocol analysis, active discovery, and device and traffic analysis in a mobile solution, giving you the information you need to control your network and minimize disruption.
Click here for your free trial.

 

03/27/09

Today's most-read stories:

  1. IBM confirms North America layoffs
  2. IPv6 is not backwards compatible, developers admit
  3. Nasty new worm targets home routers, cable modems
  4. CEO payday: How much tech chiefs made in '08
  5. Google: IPv6 is easy, not expensive
  6. Melissa virus turning 10 ... (age of the stripper unknown)
  7. The FCC teaches me a lesson: Don't complain
  8. 10 great free sites and downloads
  9. Rogue SharePoint sites pose security menace
  10. Hackers turn Google into vulnerability scanner
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Free Trial: Fluke's AnalyzeAir
Get the insight you need into the RF sources that impact your wireless LAN with a complimentary trial copy of Fluke Networks' AnalyzeAir software. With the right tools you can easily detect, identify and locate interference. Ensure your Wi-Fi network is safe and secure.
Register for your free software now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment