RSA Conference news preview Microsoft discloses ambitious security strategy Microsoft Thursday began detailing a security strategy that will see it combine its identity management efforts with its Forefront security products built for clients, servers and the network edge. Microsoft will further dissect the plan, which uses Active Directory as its foundation, at next week's RSA Conference under the marketing banner Business Ready Security. Cloud Security Alliance formed to promote best practices A group calling itself the Cloud Security Alliance announced its formation Tuesday, with eBay and ING as founding members. The alliance, which plans to make its first big splash at the upcoming RSA Conference, was formed to promote security best practices in a cloud computing environment. HP Software bolsters application-scanning products HP Software Wednesday updated its security products to help customers scan Web-based applications for vulnerabilities. On display at HP's booth during next week's RSA Conference in San Francisco, WebInspect 8.0, HP's Web-application scanning tool, has been upgraded to support vulnerability scans of Adobe Flash and Web 2.0 technologies. Other security news Black Hat 'supertalk' halted due to vendor concerns The Black Hat security conference is full of drama again in Amsterdam, with the last-minute cancellation of a presentation by a group of researchers scheduled to reveal a dangerous software vulnerability. Researcher finds possible bug in Apple's iPhone Famed Mac hacker Charlie Miller has found another possible security vulnerability in Apple's iPhone. Call it "April Madness": Colleges to duke it out over IT security The University of Texas at San Antonio (UTSA) this weekend will host the 4th annual National Cyber Defense Competition, as an elite eight college teams will battle to see which is best at protecting data from would-be hackers. Study: Mistakes, Not Insiders, to Blame for Most Breaches 2008 was a banner year for security breaches, according to new research from Verizon. And while many security vendors have been banging the drum about the threat of malicious insiders, this report indicates organizations should be more wary of outside attacks (Read Senior Editor Bill Brenner's take on the insider threat in Laid-off Workers as Data Thieves?) DOJ: US government exceeded surveillance authority The U.S. National Security Agency (NSA) exceeded its surveillance authority of U.S. residents under a far-reaching telephone and Internet communications wiretap program, the U.S. Department of Justice said Thursday. Cybercriminals target ISPs in developing APJ countries Recent research by information security vendor Symantec has shown that Internet service providers (ISP) in developing countries in the Asia Pacific and Japan region are at risk of being targeted by cybercriminals. The state of spam 2009, Part 3 Cloudmark CTO Jamie de Guerre continues his response to the question of what has changed in the battle against spam in the last year, discussing free content-hosting services, compromised accounts at Webmail providers and new-media spam. Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide. April giveaways galore Cisco Subnet and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment