Search This Blog

Wednesday, August 19, 2009

8 Dirty Secrets of the IT Security Industry;FTC's electronic health record breach rule sparks debate

8 Dirty Secrets of the IT Security Industry; FTC's electronic health record breach rule sparks debate
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile


Sponsored by Certeon
rule

Global Media on Virtualization
In this whitepaper learn why Global Media Company has made a strategic decision to embrace a virtualization strategy and has made a significant investment in WAN acceleration for SharePoint, Microsoft's enterprise content management (ECM) and collaboration technology. See how Certeon's aCelera virtual appliance for WAN acceleration and optimization can save you 60% in capital and operations TCO over proprietary hardware solutions, while reducing your application response time to remote users by 95%.

Learn more

rule

Spotlight Story
Canada tackles trust framework

Last issue I was talking about the U.S. General Services Administration's recent efforts to develop a trust framework for identity in the federal government. Not to be outdone, our neighbors to the North are embarking on a similar effort. Read full story

Related News:

8 Dirty Secrets of the IT Security Industry
Joshua Corman would seem an unlikely critic of IT security vendors. After all, he works for one. Yet Corman, principal security strategist for IBM's Internet Security Systems division, is speaking out about what he sees as eight trends undermining the ability of IT security practitioners to mount an effective defense against online outlaws.

FTC's electronic health record breach rule sparks debate
Trying to get a handle on what most certainly will be an explosion of digitization of medical records the Federal Trade Commission today issued the final rules requiring "certain Web-based businesses to notify consumers" when the security of their electronic health information is breached.

Motorola boosts wireless network security
Motorola Tuesday said it is adding vulnerability assessment to its wireless intrusion-prevention system (IPS) device so that organizations can scan for security holes in Wi-Fi and wireline networks.

Security start-up Rohati extends access-control gear to the cloud
Security start-up Rohati Systems today outlined a strategy for expanding its access-control capabilities to cloud-based services.

DNS 'blacklist' unveiled
Nominum plans to announce on Tuesday a novel DNS security capability that functions like a spam blacklist, providing automated, real-time checking of DNS queries against a list of Web sites that are known to be malicious.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Cool BlackBerry games
Black HatBlackBerries are known for e-mail, but they are also getting better at mobile games. Here are 10 of the best.

Google facts
IT quizTake this quiz to see how well you know the company – and no fair googling the answers.

Dynamic Security in the Virtualized Data Center Network
New application designs and new infrastructures based on virtual resources are generating new communication patterns in data center networks that can't be secured by conventional, perimeter-oriented designs. Join us for this live webcast September 17, 2009 to discover a dynamic, scalable architecture for securing virtual services in new data center networks and how to extend protection across the new traffic flows and much more.
Register now.


Unifying Management Systems for Deep Savings
To deliver the availability and performance the business demands, network management teams need to optimize fault management, unify fault and performance management, automate change and configuration management, implement run-book automation, and deploy a configuration management system based on a federated CMDB. This integrated approach is called automated network lifecycle management and is outlined in this white paper.
Read Now

 

August 19, 2009

TOP STORIES | MOST DUGG STORIES

  1. Apple disasters
  2. Account password reset procedures a joke
  3. FAQ: How to get Windows 7 on the cheap
  4. When Apple flops: The worst products of all time
  5. Port 666
  6. Buy Guitar Hero 5, get GH Van Halen early
  7. Microsoft planned to bury XML developer, says federal judge
  8. How to build a 100,000-port Ethernet switch
  9. The greatest open source software of all time
  10. The 10 most idiotic iPhone apps

Closing the Risk Gap in Privileged Access Control
In this whitepaper, Enterprise Management Associates (EMA) examines this critical issue in IT security administration in light of the Symark approach to helping businesses move from a trust-based system to a secure, auditable process in order to provide a higher standard of control and better support for regulatory compliance.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: