Search This Blog

Monday, September 14, 2009

A directory worth a look

Steganography meets VoIP in hacker world; Top 10 cool satellite projects
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile


Sponsored by Courion Corporation
rule

White Paper: Balancing Security and ROI
Download this important, topical White Paper from Courion and RSA, the security division of EMC: Securing Sensitive Information with Identity and Access Assurance to learn how you can securely and cost-effectively ensure that only the right people have access to the right resources.

Click to continue

rule

Spotlight Story
A directory worth a look

Last issue I said, "Directories don't get headline billing here much anymore." I should have known I would soon be corrected, as just a day or two later I had a trio of bright-eyed Aussies on the phone who wanted to talk about -- directories. Read full story

Related News:

Steganography meets VoIP in hacker world
Researchers and hackers are developing tools to execute a new data-leak threat: sneaking proprietary information out of networks by hiding it within VoIP traffic.

Top 10 cool satellite projects
Whether they are monitoring the movement of Great White sharks swimming off the coast of Massachusetts or looking for asteroids streaking towards Earth, satellites are, by their very definition, cool. Here we take a look at some of the most recent technology advances and deployments in recent months.

Faster, more affordable satellite communications spark new services
CIOs are giving satellite communications a second look, as providers deliver faster, more affordable services and as more government agencies and large corporations focus on keeping networks up and running.

Apple fixes Flash snafu in Snow Leopard, patches 33 bugs in Leopard
Less than two weeks after Apple launched Snow Leopard, the company today issued the new operating system's first security update. In a separate upgrade, Apple patched 33 vulnerabilities in 2007's Leopard, and about half as many in the even older Tiger.

Top 5 best practices for firewall administrators
Summer vacation is over and the busy holiday season is just a few months away -- not just for you, but for hackers as well. They plan to take advantage of your time off and the relaxed holiday atmosphere at Christmas and New Year's. Michael Hamelin, chief security architect at Tufin Technologies, says don't let your guard down. He provides his top 5 best practices for managing your firewall.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

ESG: Why SharePoint Needs WAN Optimization
According to recent research from the Enterprise Strategy Group (ESG), implementing SharePoint is a Top 5 initiative for CIOs. But a hidden challenge in SharePoint is to ensure that end users are able to quickly access and edit files when connected via the WAN. Learn about the key benefits organizations have realized as a result of Wide Area File Services Technology.
Click here to continue.


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 14, 2009

TOP STORIES | MOST DUGG STORIES

  1. Linux driver chief calls out Microsoft over code submission
  2. 'Wiretapping' charges may be the silliest ever recorded
  3. Developer denies software to beat Chinese censors is malicious
  4. Top 10 cool satellite projects
  5. 802.11n demands special considerations
  6. HP puts the net pedal to the metal
  7. How to make yourself layoff-proof
  8. No alternative to Microsoft Office? IBM begs to differ
  9. Verizon protests Avaya's potential Nortel enterprise business buy
  10. The history of steganography

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: