The fantasy and reality of government security In the movies the government has always got the best toys, the cutting edge technology and the tightest security standards. Those who have worked on security projects within... Security Pros Warm to Web 2.0 Access Facebook, LinkedIn and Twitter, once viewed as high-risk, productivity-sucking applications, seem to have wiggled their way into the hearts of security teams nationwide. In fact, most organizations no longer block the popular web sites and allow employees to access these Web 2.0 applications at work, according to a new survey from the Security Executive Council. Mobile browsers bring new security headaches The new generation of mobile Web browsers is going to introduce for enterprise IT departments a rash of security challenges. The good news is that many of those challenges are familiar ones, from desktop browsers. Reader's Choice picks for the best Windows open source projects Microsoft Subnet blogger Ron Barrett has assembled a collection of readers all time favorite Windows open source tools for security, network management, graphics and more. Video: DEMO 09: Purewire checks online reputations Purewire's Purewire Trust service lets users check out the online reputation of people, Web sites and things to make sure bad stuff doesn't happen to Web surfers. Catbird tightens security of virtual machines Catbird is upgrading its virtual security software platform to better track virtual machines as they replicate themselves and to make sure the proper security policies follow them wherever they go. Certgate unveils encryption SD cards for mobiles Germany company Certgate has released versions of an SD card that encrypt data on Windows Mobile 6.1 smartphones and e-mail on BlackBerry devices. Security Implications of the Humble Computer Clock Is the clock on every computer system in your organization set to the correct time? If your answer is no, you're not alone. According to a 2007 study by Florian Buchholz and Brett Tjaden, both professors at James Madison University in Virginia, more than a quarter of the Web servers on the Internet have their clocks off by more than 10 seconds. Making sure that computers are set with the correct time is one of those seemingly petty technical things that can unfortunately have big, negative consequences if not done properly. That's because assumptions about time and its flow permeate modern computer systems-including software, hardware and networking. This is true of desktop systems, servers, mobile devices and even embedded systems like HVAC, alarm systems and electronic doorknobs. Enter for a Microsoft training giveaway from New Horizons New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment