Search This Blog

Tuesday, April 21, 2009

The state of spam 2009, Part 4

New antispam technologies from Cloudmark
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Podcast: Improve Security & Compliance
An interview with Jukka Kouletsis, Program Manager at Dell, discussing lessons learned in the field about Windows Vista deployment. Topics include a timeline for a deployment plan, strategies for improving security and compliance, and the impact of intangibles.

rule

Spotlight Story
The state of spam 2009, Part 4

M. E. Kabay By M. E. Kabay
Jamie de Guerre, CTO of Cloudmark, talks about the latest antispam technologies coming out of Cloudmark's research labs. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or
66.186.127.216 to your white-list file. Thank you.

Podcast: Security threats: Good, bad and ugly
Zulfikar Ramzan, technical director of Symantec Security Response, breaks down key statistics from the vendor's annual Threat Report. (9:44)

The state of spam 2009, Part 3 Cloudmark CTO Jamie de Guerre continues his response to the question of what has changed in the battle against spam in the last year, discussing free content-hosting services, compromised accounts at Webmail providers and new-media spam.

The state of spam 2009, Part 2 Cloudmark CTO Jamie de Guerre: I think there have been several changes and a couple of events that happened in the past year that are interesting and will have an effect on how spam is sent in the coming year.

The state of spam 2009, Part 1 Spam - not SPAM the luncheon meat (and you have GOT to visit the official SPAM Web site, which plays like a parody the Monty Python crew might have dreamed up) - is a dreadful nuisance, with estimates that 95% of all e-mail in the world now consists of rubbish. Periodically I look into the state of the spam to see how the war is going.

The state of spam: An interview with Jamie de Guerre, Part 2 What does the future hold for fighting spam? My two-part interview with Jamie de Guerre, CTO of Cloudmark, concludes today.

The state of spam: An interview with Jamie de Guerre, Part 1 Spam is a major operational problem for all professionals because of its waste of bandwidth; it is a significant nuisance even for non-professionals, contributing to computer-based crime and increasing doubts about e- ...

Clamp down urged on staff flouting security rules Businesses are being urged to clamp down on staff who are flouting security rules, after a survey found that too many companies are vulnerable to ignorant or careless behaviour from their workforce.

RSA Conference kicks off on somber note Against an omnipresent backdrop of recession and uncertainty, IT security pros this week will gather at an RSA Conference focused on malware proliferation, protection of virtualized and cloud computing environments, and the specter of rising government involvement in their work.

5 Security Flubs Users Make When Browsing the Web You can install the best firewalls, patch religiously, and make sure your anti-virus software is always up-to-date, but there is one online risk factor you can never control: the user. Whether they are downloading dangerous content or falling prey to phishing scams, the end user continues to be the toughest security risk to mitigate in most organizations.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Dell
rule

Podcast: Improve Security & Compliance
An interview with Jukka Kouletsis, Program Manager at Dell, discussing lessons learned in the field about Windows Vista deployment. Topics include a timeline for a deployment plan, strategies for improving security and compliance, and the impact of intangibles.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

04/21/09

Today's most-read stories:

  1. Oracle agrees to buy Sun for $7.4B
  2. Buzzblog: Oracle acquires Sun in $7.4B stunner
  3. Adobe's new Flash can stream Internet content to TVs
  4. Microsoft discloses ambitious security strategy
  5. Palm's webOS lives up to hype, early developers say
  6. RSA Conference kicks off on somber note
  7. Cisco reveals aggressive pricing for blade server system
  8. The Incredible International Submarine Cable Systems
  9. PBX killer, Voice CAL coming to OCS in 2010
  10. 802.11n complications are imminent
  11. Honda demos motion-assistance devices


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: