Search This Blog

Thursday, March 05, 2009

The Internet Protectors

Introducing a new security information resource
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Brocade
rule

Managing Connectivity to the Storage Fabric
This whitepaper outlines tools for an integrated end-to-end SAN management suite for the enterprise data center.

rule

Spotlight Story
The Internet Protectors

M. E. Kabay By M. E. Kabay
Guest writer Pat Bitton: We all know that there is a huge amount of variably accurate security information on the Web. There are many blogs, forums, bulletin boards, white papers, podcasts, and Webinars - some posted by vendors, others by enthusiastic volunteers. The trouble is, there is no coherent resource for all types of computer security information in one place that is appropriate for all levels of expertise. The arrival of social networking on the Internet provided the opportunity I'd been looking for to change this situation. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Computer Security Handbook Fifth Edition is ready After three years of labor, the Fifth Edition of the Computer Security Handbook (CSH5) is ready! Senior Editor Sy Bosworth and new Editor Eric Whyne and I are proud to see the two-volume work for sale at last.

Bluetooth is not a dental condition Computer scientists Karen Scarfone of the Computer Security Division of the Information Technology Laboratory at the NIST has collaborated with John Padgette, an associate at Booz Allen Hamilton to write a new Special Publication entitled "Guide to Bluetooth Security," which summarizes the security issues and provides recommendations for protecting sensitive information carried via these wireless systems.

Cell phone security Computer scientists Wayne Jansen and Karen Scarfone of the Computer Security Division of the Information Technology Laboratory at the National Institute of Standards and Technology (NIST) have written a new (October 2008) Special Publication entitled "Guidelines on Cell Phone and PDA Security," which summarizes the security issues and provides recommendations for protecting sensitive information carried on these devices.

Reader's Choice picks for the best Windows open source projects Microsoft Subnet blogger Ron Barrett has assembled a collection of readers all time favorite Windows open source tools for security, network management, graphics and more.

Catbird tightens security of virtual machines Catbird is upgrading its virtual security software platform to better track virtual machines as they replicate themselves and to make sure the proper security policies follow them wherever they go.

FTC warns of bogus economic stimulus sites Some Web sites appearing to offer free U.S. government grants tied to a recently passed economic stimulus package can end up bilking unwary consumers out of more than US$1,000, the U.S. Federal Trade Commission said Wednesday.

Mobile browsers bring new security headaches The new generation of mobile Web browsers is going to introduce for enterprise IT departments a rash of security challenges. The good news is that many of those challenges are familiar ones, from desktop browsers.

The fantasy and reality of government security In the movies the government has always got the best toys, the cutting edge technology and the tightest security standards. Those who have worked on security projects within the government know that in real life government security standards and implementations can vary all across the range from quite serious to laughable.

IBM looks to secure Internet banking with USB stick IBM's Zurich research laboratory has developed a USB stick that the company says can ensure safe banking transactions even if a PC is riddled with malware.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Brocade
rule

Managing Connectivity to the Storage Fabric
This whitepaper outlines tools for an integrated end-to-end SAN management suite for the enterprise data center.

rule

The Power of LAN Test Tools.
Successfully deploy a wired/wireless Ethernet network and keep it running with exceptional up-time. Ensure your network is ready for new technologies by running assessment tests that provide you with the data you need. Resolve connectivity issues and quickly address network performance complaints. Get all of the details today.
Download this whitepaper now.


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.

 

03/05/09

Today's most-read stories:

  1. Helping to keep government's prying eyes at bay
  2. Three nightmares when managing Macs
  3. User sues AT&T over $5,000 Web bill
  4. Linux Foundation taking over Linux.com site
  5. Koobface worm to users: Be my Facebook friend
  6. Back when Google was just a gleam
  7. Sprint comeback: Hard, but doable
  8. iPod ... do you? A playful list of iPods
  9. Resident Evil 5 leaked online, for shame
  10. Apple unveils new Mac mini with Nvidia 9400, FireWire 800
  11. Microsoft TechFest: Commute UX dialog system for in-car infotainment


Network World on Twitter: Get our tweets and stay plugged in to networking news


A Simplified Data Center - Live March 12
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: