8 Dirty Secrets of the IT Security Industry Joshua Corman would seem an unlikely critic of IT security vendors. After all, he works for one. Yet Corman, principal security strategist for IBM's Internet Security Systems division, is speaking out about what he sees as eight trends undermining the ability of IT security practitioners to mount an effective defense against online outlaws. FTC's electronic health record breach rule sparks debate Trying to get a handle on what most certainly will be an explosion of digitization of medical records the Federal Trade Commission today issued the final rules requiring "certain Web-based businesses to notify consumers" when the security of their electronic health information is breached. Motorola boosts wireless network security Motorola Tuesday said it is adding vulnerability assessment to its wireless intrusion-prevention system (IPS) device so that organizations can scan for security holes in Wi-Fi and wireline networks. Security start-up Rohati extends access-control gear to the cloud Security start-up Rohati Systems today outlined a strategy for expanding its access-control capabilities to cloud-based services. DNS 'blacklist' unveiled Nominum plans to announce on Tuesday a novel DNS security capability that functions like a spam blacklist, providing automated, real-time checking of DNS queries against a list of Web sites that are known to be malicious. August Giveaways Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31. Network World on Twitter? You bet we are |
No comments:
Post a Comment