Search This Blog

Tuesday, September 15, 2009

The IA Professional's Toolkit Part 3

Sears forced to destroy spyware-gathered information; Domain-name abuse proliferates; rogue registrars turn a blind eye
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by WatchGuard
rule

Free White Paper: Network Security in an Economic Downturn
Hackers and criminals have more reasons to target your network in an economic downturn. Budget cuts and reduced headcount create additional challenges for you. In this Free White Paper learn how you can maintain IT value and network security, while building a solid foundation for growth. Download now!

Click to continue

rule

Spotlight Story
The IA Professional's Toolkit Part 3

Tightening financial constraints on any business are requiring information technology (IT) and information assurance (IA) professionals to start showing proof of benefit and cost justifications for their departments, their workforce, their capital expenditures, and their consultants. In an interview, one CISO told me that a consultant or employee has to provide good financial figures, cost justifications, and achievable metrics so she can back up her requests to the Board of Directors for approval and funding; she won't hire any consultant who fails to provide such details. Read full story

Related News:

Sears forced to destroy spyware-gathered information
As part of its final settlement with the Federal Trade Commission, Sears must destroy any consumer information it collected through a downloadable software application the FTC deemed spyware.  

Domain-name abuse proliferates; rogue registrars turn a blind eye
Domain names are a key part of botnet and phishing operations, and cyber-criminals are plundering domain-name registrars around the world to get them.

How registrars tackle domain name abuse
Some rogue registrars are happy to turn a blind eye to domain-name abuse; others are fighting back.

How we tested endpoint data loss prevention tools
This test was conducted at the Iowa State University Internet-Scale Event and Attack Generation Environment (ISEAGE) Laboratory. A VMware vSphere ESX server was set up on a Dell PowerEdge 1950 with a quad-core Xeon processor, 4GB of RAM, and a 500GB SATA hard drive.

Access control vendors unite to tackle Linux, Unix and Windows
Symark International Monday is announcing the acquisition of BeyondTrust for approximately $20 million in a deal that brings together two privately-held access control product vendors. Under the deal, Symark is adopting the BeyondTrust name.

Block data leaks at the endpoint
Endpoint data loss prevention tools are designed to block sensitive data from leaving PCs, laptops and servers. We tested products from TrendMicro, Websense and Indentity Finder, and discovered that endpoint DLP tools offer sophisticated, easy-to-use methods for protecting sensitive corporate data.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

Win a 32"LCD at on Sept. 29th
Security Directions: A Virtual Conference Presented by - CIO, Computerworld, CSO, InfoWorld & Network World. Join us for "Protecting Your Enterprise in a Dynamic Infrastructure" - a unique online security event. Listen to CSO publisher, Bob Bragdon and a panel of experts and users, to hear about real-world security deployments. And just for attending, you'll have a chance to win a flat screen LCD TV.
Register Now!


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 15, 2009

TOP STORIES | MOST DUGG STORIES

  1. IEEE stamps "approved" on 802.11n Wi-Fi standard
  2. Sprint CEO calls the iPhone the "Michael Jordan" of smartphones
  3. Developer denies software to beat Chinese censors is malicious
  4. 10 cool Web apps developed in two days
  5. Top 10 cool satellite projects
  6. 11n Wi-Fi chip discovered in new iPod Touch
  7. 802.11n pioneer sets 'wicked fast' expectations for wireless
  8. Five end game scenarios - How the Internet will die
  9. Microsoft: In-place Windows 7 upgrades can take up to 20 hours
  10. Linux driver chief calls out Microsoft over code submission

IBM ISS X-Force Threat and Risk Report
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Read Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: