Search This Blog

Tuesday, April 21, 2009

Boost your corporate security posture without losing a dime; 5 Security Flubs Users Make Browsing

How to ramp up corporate security in lean economic times
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by RSA Security
rule

Security Operations 2.0: What does this mean for you?
Forrester and RSA On- Demand Webcast: Webcast reviews the following topics: Why are more and more companies putting a greater emphasis on building a security operations center or function? What should your top priorities be to build the most effective security operations? How can the latest release of RSA enVision (R) platform help you use security to meet your ongoing business objective To listen to the replay

rule

Spotlight Story

Boost your corporate security posture without losing a dime
Corporate security teams around the world are seeing their budgets get hacked and slashed down to the bare bones (just like every other dept). Many of those that are tasked with the protection of their company's digital data are frustrated and concerned. Without those dollars they will struggle to keep the shields up and perimeter secured. That's when we need to turn to the old adage use what you have for support.

Related News:

5 Security Flubs Users Make When Browsing the Web You can install the best firewalls, patch religiously, and make sure your antivirus software is always up-to-date, but there is one online risk factor you can never control: the user. Whether they are downloading dangerous content or falling prey to phishing scams, the end user continues to be the toughest security risk to mitigate in most organizations.

Clamp down urged on staff flouting security rules Businesses are being urged to clamp down on staff who are flouting security rules, after a survey found that too many companies are vulnerable to ignorant or careless behaviour from their workforce.

Most businesses don't have their heads around cloud security: survey Businesses are concerned about the management and privacy of data they entrust to cloud computing service providers, but not many are doing anything about it, according to a Deloitte survey.

New Symantec CEO Says Security Sells in Hard Times Enrique Salem, who took the reins of Symantec as president and CEO this month, sat down with Computerworld's Scot Finnie and Lucas Mearian at the Storage Networking World conference here to talk about how his company is dealing with the recession and his vision of the future of Symantec and the technology business.

RSA Conference kicks off on somber note Against an omnipresent backdrop of recession and uncertainty, IT security pros this week will gather at an RSA Conference focused on malware proliferation, protection of...

Criminals pay top money for hackable Nokia phone Criminals are willing to pay thousands of euros for a discontinued Nokia mobile phone with a software problem that can be exploited to hack into online bank accounts, according to a fraud investigator in the Netherlands.

FBI used spyware to catch cable-cutting extortionist The FBI used spyware to catch a Massachusetts man who tried to extort Verizon and Comcast by cutting 18 data- and voice-carrying cables in 2005, documents obtained under the Freedom of Information Act by Wired.com revealed yesterday.

Norman launches security appliance at RSA Norman Network Protector scans traffic and blocks the content it deems dangerous. The appliance will be unveiled at the annual RSA security conference in San Francisco.

Qualys announces Web apps scanning At RSA Conference 2009 Qualys will announce its own Web-application scanning software and plans to develop or acquire technology to defend the vulnerabilities it finds.

NEC gets into security software Japanese network equipment vendor NEC is making its first foray into security software at RSA Conference 2009 with the introduction of a Web application firewall to the U.S.

Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by RSA Security
rule

Security Operations 2.0: What does this mean for you?
Forrester and RSA On- Demand Webcast: Webcast reviews the following topics: Why are more and more companies putting a greater emphasis on building a security operations center or function? What should your top priorities be to build the most effective security operations? How can the latest release of RSA enVision (R) platform help you use security to meet your ongoing business objective To listen to the replay

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

04/21/09

Today's most-read stories:

  1. Oracle agrees to buy Sun for $7.4B
  2. Buzzblog: Oracle acquires Sun in $7.4B stunner
  3. Adobe's new Flash can stream Internet content to TVs
  4. Microsoft discloses ambitious security strategy
  5. Palm's webOS lives up to hype, early developers say
  6. RSA Conference kicks off on somber note
  7. Cisco reveals aggressive pricing for blade server system
  8. The Incredible International Submarine Cable Systems
  9. PBX killer, Voice CAL coming to OCS in 2010
  10. 802.11n complications are imminent
  11. Honda demos motion-assistance devices


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



1 comment:

Anonymous said...

UwkKsjVwhWap [url=http://nike02.blog.fc2blog.net/]nike woven[/url] DteBehEubKxp[url=http://nike-air98.webnode.jp/]ナイキ[/url] YubAyaYgpOgo [url=http://nike09.webnode.jp/]ナイキシューズ[/url] BaqFupQmnCkc [url=http://adidas833.webnode.jp/]アディダス スニーカー[/url]FthUbbAsvWek [url=http://nike76.webnode.jp/]ナイキスニーカー[/url]XzpEsdAccTfa [url=http://nike141.webnode.jp/]ナイキランニング[/url] RdaGgfQbgXse [url=http://adidas75.webnode.jp/] アディダス ジャージ[/url] FgnPzpUpcBjd [url=http://adidas12.webnode.jp/]adidas スニーカー[/url]