Sears forced to destroy spyware-gathered information As part of its final settlement with the Federal Trade Commission, Sears must destroy any consumer information it collected through a downloadable software application the FTC deemed spyware. Domain-name abuse proliferates; rogue registrars turn a blind eye Domain names are a key part of botnet and phishing operations, and cyber-criminals are plundering domain-name registrars around the world to get them. How registrars tackle domain name abuse Some rogue registrars are happy to turn a blind eye to domain-name abuse; others are fighting back. How we tested endpoint data loss prevention tools This test was conducted at the Iowa State University Internet-Scale Event and Attack Generation Environment (ISEAGE) Laboratory. A VMware vSphere ESX server was set up on a Dell PowerEdge 1950 with a quad-core Xeon processor, 4GB of RAM, and a 500GB SATA hard drive. Access control vendors unite to tackle Linux, Unix and Windows Symark International Monday is announcing the acquisition of BeyondTrust for approximately $20 million in a deal that brings together two privately-held access control product vendors. Under the deal, Symark is adopting the BeyondTrust name. Block data leaks at the endpoint Endpoint data loss prevention tools are designed to block sensitive data from leaving PCs, laptops and servers. We tested products from TrendMicro, Websense and Indentity Finder, and discovered that endpoint DLP tools offer sophisticated, easy-to-use methods for protecting sensitive corporate data. Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Network World on Twitter? You bet we are |
No comments:
Post a Comment