Search This Blog

Tuesday, July 07, 2009

CSIRT Management: Lessons from Other Group Postmortems (Part 2)

The 10 dumbest mistakes network managers make; Metropolitan Police inks identity management deal
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by SolarWinds
rule

Top 5 Free Networking Tools
Visit Network World's NetFlow and IP SLA Solution Center today to find Webcasts, videos, downloads and whitepapers offering: Top 5 Free Networking Tools, Top 5 Tools for Diagnosing and Solving Network Problems, The Shortcut Guide to Network Management, Network Troubleshooting techniques and essentials, and more.

rule

Spotlight Story
CSIRT Management: Lessons from Other Group Postmortems (Part 2)

In Week 9 of the 11-week course on Computer Security Incident Response Team Management that I taught in summer 2008, one of the weekly discussion questions was as follows: Read full story

Related News:

The 10 dumbest mistakes network managers make
When you look at the worst corporate security breaches, it's clear that network managers keep making the same mistakes over and over again, and that many of these mistakes are easy to avoid.

Metropolitan Police inks identity management deal
The Metropolitan Police Authority has signed a five-year deal with BT for identity and access management.

Cloud security still needs a set of standards
Maybe SAS 70 isn't the standard needed for insuring cloud security after all.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Rise and fall of Nortel
vSphereFor better or worse, Nortel as we know it is coming to an end. Here's how the telecom giant got to this point.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

It's Time to Fix the Firewall
It's no secret that modern applications and threats easily circumvent the traditional network firewall - so much so that enterprises have deployed an entire crop of "firewall helpers" to help try to manage applications and threats, which has only increased cost and complexity without addressing the core problem. Read this whitepaper to learn how you can regain application visibility and control and fix your firewall.
Learn more now.


 

July 07, 2009

TOP STORIES | MOST DUGG STORIES

  1. The 10 dumbest mistakes network managers make
  2. Six Windows 7 features admins will actually care about
  3. Why the iPhone can't be "killed"
  4. Nortel enterprise chief wants to bring back Bay
  5. More porn sneaks onto the iPhone
  6. Security guard charged with hacking hospital systems
  7. Cisco looks to accelerate virtualization deployments
  8. Cisco announces highest certification
  9. IBM bundles x86 servers with VMware, offers special financing
  10. Ex-Bay Networks CEO: Nortel's enterprise group could do well on its own

Stopping Fraud Before it Impacts your Network
Better protect your corporate assets with a solution that integrates with existing security devices and adds comprehensive analysis including: Correlation, anomaly detection and pattern discover. Discover the benefits of using holistic reporting, visual analytics and incident response tools.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: