Search This Blog

Tuesday, September 08, 2009

The IA Professional's Toolkit Part 1

Encryption made easier with new key management tools; How we tested key management
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by Brocade
rule

Why a Firewall Sandwich?
Enterprise security through Web security, messaging security and gateway security is the only way to protect your network from intruders, identity theft, security compromises, legal liability, malware, hackers and viruses. Find out about advanced methods of firewall security that will create a "firewall sandwich" and ensure the highest level of protection.

Click here to learn more.

rule

Spotlight Story
The IA Professional's Toolkit Part 1

Starting from a sound technical foundation, information assurance (IA) professionals must hone their management skills. IA experts need to be competent in project management, team building, business justification, defining usable metrics, creating security frameworks, applying regulatory knowledge, managing client/vendor relations and managing problems. This series of articles on the Information Assurance Professional's Toolkit reviews what C-level executives want to see in their IA employees and IA consultants. Read full story

Related News:

Encryption made easier with new key management tools
In response to dramatic and widely-publicized losses of data over the last few years, IT execs are moving to deploy encryption in every corner of the enterprise. While encryption does reduce the chances of data loss, it can also create a management nightmare, with dozens of different encryption applications using hundreds or thousands of keys.

How we tested key management
The Key Management Servers were tested with standard applications on both Windows and Linux environments, using Windows 2008 with the Microsoft Certificate Authority, IIS and SQL Server 2005, and Ubuntu 9.04 with Apache 2.2.12. We tested the products by setting each up to issue keys, revoke and renew keys, monitor for correct operation, create reports and logs of activity, setting policies for issuing keys and revoking them, and looking at the granularity of management capabilities.

Vormetric's agent-based approach provides strong key management across all apps
The Vormetric Data Security Expert Security Server is not a direct competitor to the Thales and Venafi systems. Rather than managing keys used by other certificate authorities or encryption solutions, it manages its own encryption solution across multiple systems.

Venafi key management software works smoothly with supported apps
Venafi Encryption Director was the easiest of the three products to deploy. There was no fiddling with server applications to apply standards-based connectors, or to install add-on encryption modules. 

Microsoft Promises IIS Bug Patch
Microsoft said it is working on a patch for a bug in its popular Web server software, but experts say it's unlikely that the company will field a fix fast enough to make this week's regular Patch Tuesday release.

New attacks on cloud servcies call for due diligence by customers
Academics have figured out a way to find particular applications running within cloud providers' networks and to threaten their security.

Voice biometrics haven't caught on just yet
I had a note last week from PR dynamo Melissa Hyland talking about new voice biometrics solutions from Nuance Communications. Since I hadn't covered the company before, I looked up their management and advisers to see if there were any "old friends" – and I found one.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

IBM ISS X-Force Threat and Risk Report
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Read Now


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 08, 2009

TOP STORIES | MOST DUGG STORIES

  1. 12 words you can never say in the office
  2. Developer denies software to beat Chinese censors is malicious
  3. Encryption made easier with new key management tools
  4. How to make yourself layoff-proof
  5. Can you see John Chambers directing Cisco to buy Alcatel-Lucent?
  6. Wi-Fi encryption cracked in 60 seconds
  7. Fast, universal broadband: dirty secret about Roadblock
  8. IPhone passcode bugs revealed
  9. BBN, Raytheon and a fresh JFK conspiracy theory
  10. Dirty vendor secrets

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: