Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Tuesday, August 18, 2009
How to build a 100,000-port Ethernet switch; 10 sports technologies to love and 5 to hate; DNS 'blacklist' unveiled
10 sports technologies to love and 5 to hate; DNS 'blacklist' unveiled
DNS 'blacklist' unveiled Nominum plans to announce on Tuesday a novel DNS security capability that functions like a spam blacklist, providing automated, real-time checking of DNS queries against a list of Web sites that are known to be malicious.
Motorola boosts wireless network security Motorola Tuesday said it is adding vulnerability assessment to its wireless intrusion-prevention system (IPS) device so that organizations can scan for security holes in Wi-Fi and wireline networks.
John Gruber: How Android can (finally) beat iPhone John Gruber has stuck his neck out again at his Daring Fireball blog, this time with a post offering advice to Google and especially to Android device makers on how challenge successfully the iPhone.
Start-up DroidSecurity tackles Google Android security Start-up DroidSecurity is developing consumer and enterprise security software for the Google Android operating system, with its first offering a consumer-oriented antivirus and phone-tracking suite for Android smartphones.
FTC's electronic health record breach rule sparks debate Trying to get a handle on what most certainly will be an explosion of digitization of medical records the Federal Trade Commission today issued the final rules requiring "certain Web-based businesses to notify consumers" when the security of their electronic health information is breached.
Juniper's enterprise attack is making progress Juniper today trumpeted the fact that its EX Series Ethernet Switches have posted four consecutive quarters of revenue growth through 2Q09. Its EX series has surpassed one million ports shipped, according to the most recent Dell'Oro Ethernet Switching Market Report.
The day the blogging stopped On Tuesday, 1,370 Japanese stopped blogging and Twittering. There's perhaps nothing unusual about that; after all, hundreds give up social media efforts every day. But for these people the halt to their online activities has been brought on by the law.
August Giveaways Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.
Effectively Supporting Consumer-Owned Smartphones Resolve Smartphone downtime incidents quickly by sharpening your approach to mobile device management. In this whitepaper Osterman Research clearly explains which Smartphones are being used, how IT shops are managing these devices and how the heterogeneous nature of the market is causing more complexity for IT professionals. Learn More
Why You Need Citrix Essentials for Hyper-V Citrix Essentials for Hyper-V adds advanced capabilities to Hyper-V to create, integrate, manage and automate virtual datacenters at half the cost of other solutions. Simply add Citrix Essentials for Hyper-V to your existing Hyper-V implementation to gain powerful new capabilities for your virtualization infrastructure. Click here to learn more.
Perfecting your Disaster Recovery Strategy How fast can you recover data in the event of a disaster? Optimize your backup and disaster recover strategy with this Executive Guide. Get expert tips and recommendations in this collection of in-depth articles from Network World and its sister publications. Learn More