Computer Security Handbook Fifth Edition is ready After three years of labor, the Fifth Edition of the Computer Security Handbook (CSH5) is ready! Senior Editor Sy Bosworth and new Editor Eric Whyne and I are proud to see the two-volume work for sale at last. Bluetooth is not a dental condition Computer scientists Karen Scarfone of the Computer Security Division of the Information Technology Laboratory at the NIST has collaborated with John Padgette, an associate at Booz Allen Hamilton to write a new Special Publication entitled "Guide to Bluetooth Security," which summarizes the security issues and provides recommendations for protecting sensitive information carried via these wireless systems. Cell phone security Computer scientists Wayne Jansen and Karen Scarfone of the Computer Security Division of the Information Technology Laboratory at the National Institute of Standards and Technology (NIST) have written a new (October 2008) Special Publication entitled "Guidelines on Cell Phone and PDA Security," which summarizes the security issues and provides recommendations for protecting sensitive information carried on these devices. Reader's Choice picks for the best Windows open source projects Microsoft Subnet blogger Ron Barrett has assembled a collection of readers all time favorite Windows open source tools for security, network management, graphics and more. Catbird tightens security of virtual machines Catbird is upgrading its virtual security software platform to better track virtual machines as they replicate themselves and to make sure the proper security policies follow them wherever they go. FTC warns of bogus economic stimulus sites Some Web sites appearing to offer free U.S. government grants tied to a recently passed economic stimulus package can end up bilking unwary consumers out of more than US$1,000, the U.S. Federal Trade Commission said Wednesday. Mobile browsers bring new security headaches The new generation of mobile Web browsers is going to introduce for enterprise IT departments a rash of security challenges. The good news is that many of those challenges are familiar ones, from desktop browsers. The fantasy and reality of government security In the movies the government has always got the best toys, the cutting edge technology and the tightest security standards. Those who have worked on security projects within the government know that in real life government security standards and implementations can vary all across the range from quite serious to laughable. IBM looks to secure Internet banking with USB stick IBM's Zurich research laboratory has developed a USB stick that the company says can ensure safe banking transactions even if a PC is riddled with malware. Enter for a Microsoft training giveaway from New Horizons New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment