Search This Blog

Wednesday, March 11, 2009

'Outlaws and terrorists' amplify security challenges; Keeping the government's prying eyes at bay

Security pros need to respond quickly to changes to help companies survive, Bill Boni said at Infosec
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Trend Micro
rule

An Effective Security Strategy.
Reduce the complexity of your security approach while improving your defenses and lowering costs. Find out how in this whitepaper, "Lower Security Risks and Costs by Minimizing the Time to Protection." Reduce the complexity in acquiring, deploying, and managing security with a combination of hosted services and products.

rule

Spotlight Story
'Outlaws and terrorists' amplify security challenges, Motorola security chief says

Ellen Messmer By Ellen Messmer
"I've never seen the world this unstable and dangerous," said Bill Boni, Motorola's corporate security officer, at the Infosec conference in Orlando. Read full story

Related News:

Keeping the government's prying eyes at bay The Electronic Frontier Foundation (EFF) last week took the wraps off a new Web site that is designed to help you keep the government from taking the wraps off your personal communications and stored data.

Microsoft releases three updates for Windows, one of them critical As expected, Microsoft released three updates that fix vulnerabilities in Windows via the company's routine Patch Tuesday.

12 changes that would give U.S. cybersecurity a much needed kick in the pants Potential cyber attacks against federal and private-sector networks loom larger every day and that's while the Department of Homeland Security (DHS) has made some important efforts, it has yet to fulfill many of the myriad responsibilities placed on it by the national cybersecurity plan.

Scanning for Network Vulnerabilities As any network and security manager knows, new vulnerabilities are constantly being discovered and threats against corporate networks are getting increasingly sophisticated. Proactively scanning for vulnerabilities can help identify weaknesses before they become damaging to enterprise IT environments.

Companies get checklist for complying with PCI standard The organization responsible for administering the Payment Card Industry Data Security Standard is offering new guidance to companies on how to focus their PCI DSS compliance efforts so as to more quickly them in position to meet the rules on protecting credit and debit card data.

Lawmaker: New cybersecurity regulations needed The U.S. government needs to create new regulations and incentives to get private companies to protect important cyber infrastructure including the electricity grid, water facilities and financial systems, said the new chairwoman of a U.S. House of Representatives cybersecurity subcommittee.

Steps to Communicate Security's Value to Non-security People The biggest challenge security teams face in their organization is one of perception, according to Michael Santarcangelo, founder of Security Catalyst, a New York-based consultancy focused on changing the way people protect information.

Privacy Commissioner to investigate police data leakage The Office of the Privacy Commissioner for Personal Data said Monday it has ordered an investigation to probe into the police's recent data leakage incident.

Germany ratifies cybercrime treaty Germany has become the latest country to ratify the only international treaty concerning computer crime.

France, Ireland to launch e-crime police training programs France and Ireland are hoping the European Commission will back a plan to create an academically accredited cybercrime training program for law enforcement.

Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Trend Micro
rule

An Effective Security Strategy.
Reduce the complexity of your security approach while improving your defenses and lowering costs. Find out how in this whitepaper, "Lower Security Risks and Costs by Minimizing the Time to Protection." Reduce the complexity in acquiring, deploying, and managing security with a combination of hosted services and products.

rule

Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.


A Simplified Data Center - Live March 12
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings.
Register today for this Live Webcast.

 

03/11/09

Today's most-read stories:

  1. Microsoft Windows on a mainframe?
  2. Exchange alternatives: Pros and cons
  3. Symantec identifies third Downadup/Conflicker variant
  4. Iridium satellite network back to full strength after collision
  5. Juniper introduces Adaptive Threat Management
  6. Mobile browsers bring new security headaches
  7. Inexpensive scanners can 'fingerprint' paper
  8. Vendors face off in 11n 'challenge'
  9. Microsoft confirms IE8 kill switch in Windows 7
  10. To Tweet or not to Tweet, that's not an option
  11. Microsoft TechFest: Commute UX dialog system for in-car infotainment


Network World on Twitter: Get our tweets and stay plugged in to networking news


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: