Search This Blog

Friday, June 12, 2009

Social Engineering: The Fine Art of BS, Face to Face

Trend Micro upgrades data-loss prevention software; Forrester: Deep Packet Inspection As An Enabling Technology
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile


Sponsored by Actuate
rule

Meet Visualization Requirements with Ease
Think beyond the current structure of a report and personalize it with Business Intelligence Reporting Tools (BIRT) Interactive Viewer. Register for this Live Webcast scheduled for Wednesday, July 15 at 2:00 p.m. EDT/11:00 a.m. PDT, to learn how. Meet data visualization requirements faster and with less development by making BIRT web output interactive.

rule

Spotlight Story
Social Engineering: The Fine Art of BS, Face to Face

Chris Nickerson is willing to push it about as far as a person can go when it comes to security assessments. The founder of Lares, a security consultancy in Colorado, Nickerson conducts what he calls "Red Team Assessments" for clients. (See: Red Team, Blue Team.) He is paid to try and dupe a client, and the client's employees, to give them a clear picture of the weak spots in their security plan. He then advises them on how to shore up defenses more effectively in the event a real criminal comes knocking. Read full story

Related News:

Social Engineering: 5 Security Holes at the Office
If you think the biggest threat to your sensitive information lies in network security, think again. Once a criminal is inside a building, there are limitless possibilities to what that person can access or damage. Take a look at your building's security. How easy is it to get inside?

Trend Micro upgrades data-loss prevention software
Trend Micro today announced an updated version of its Windows desktop-based data-loss prevention software in two editions; one "Standard" for monitoring users and data, the other "Advanced" to add protections for intellectual property and source code.

Forrester: Deep Packet Inspection As An Enabling Technology
Deep packet inspection (DPI) is a technique that has seen success in traffic management, security, and network analysis. It is a technology that performs content analysis of network packets at line speed but is different from header or metadata-based packet inspection, which is typically performed by switches, firewalls, and IDS/IPS devices. A general DPI solution provides deep packet inspection for different applications.

June Giveaways
Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.

Network World on Twitter? You bet we are


Windows 7 + Windows Server 2008
Windows 7We found 5 things to love and 5 things to hate about Microsoft's latest operating system versions.

Open-source management
Management appsHere are nine management apps that won't break the bank.

Go Green Enterprise-Wide: It Power Management Strategies that Save
Successful power management policies deployed at enterprise scale promise numerous benefits including: Power cost savings, Environmental dividends, Rebates as well as Integration opportunities. Discover the building blocks of a successful IT Power Management policy and how this policy can align with your business's green initiatives.
Read More Now


 

June 12, 2009

TOP STORIES | MOST DUGG STORIES

  1. China dominates NSA-backed coding contest
  2. Google unveils plug-in to marry Outlook, Gmail
  3. Symantec, McAfee to pay fines over auto-renewals
  4. Nortel customers upbeat but anxious
  5. Saving Unix one kernel at a time
  6. Quiz: Are you a network know it all?
  7. Dell bundling open source applications for SMBs
  8. Cisco and Duke Energy work to build smart grid
  9. 2009 top urban legends in IT security
  10. FBI warns of Asian-specific telephone extortion scam

World-Class Security for the Mid-Size Organization
Secure your IT environment like the big IT shops. Discover a cost-effective appliance that includes built-in rules and reports for solving critical security and compliance problems. Gain the visibility you need into security incidents without spending too much on new security solutions or staff.
Get all of the Details Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: