Search This Blog

Tuesday, September 22, 2009

The IA Professional's Toolkit Part 5

Microsoft to ship free security software soon; Is Your Office Printer Secure?
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by IBM
rule


Failure to properly secure Web applications significantly impacts your ability to protect sensitive client and corporate data. IBM Rational AppScan is an automated scanner that monitors, identifies and helps remediate vulnerabilities. Download a free trial of AppScan and see how it can help prevent against the threat of attack.

Click to continue

rule

Spotlight Story
The IA Professional's Toolkit Part 5

Organizations should always be looking for ways to minimize their exposure to legal entanglements. No one wants to be sued, to be subject to regulatory sanctions or to become involved in criminal prosecutions. As an information assurance (IA) professional, you will consistently be called on to ensure that your employers or your clients are compliant with all relevant regulations; you may be asked to verify such compliance as part of your job and in collaboration with or as principal in audit procedures that protect the organization by demonstrating due diligence in the exercise of fiduciary responsibility. Read full story

Related News:

Microsoft to ship free security software soon
Microsoft has told beta testers of its free antivirus software, Microsoft Security Essentials, that it will release the final version to the public soon.

Is Your Office Printer Secure?
A new program from ISCA Labs aims to tackle network-attached device security - a problem they believe is overlooked and poses serious risks

Surveilled to death
Gibbs ponders how much we're tracked and how much we give away and wonders what the long-term outcome will be; a society of closed lips and constrained behavior, a society economical with the truth, or will it just stay business a usual?

Suspect Pleads Guilty to Huge Data Thefts
Albert Gonzalez, who was described by federal authorities as the mastermind of the massive data thefts at TJX, Heartland and other retailers, pleaded guilty to charges of conspiracy, wire fraud and aggravated identity theft.

Best practices and automation for data privacy
Your organization probably pays attention to data security, ensuring that sensitive data doesn't leak out or get into the wrong hands. But what about data privacy? How can you ensure that your organization is adequately protecting an individual's right to control the way you use his personal data? Now there's a tool to help automate privacy compliance as part of your overall corporate GRC program.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

IBM ISS X-Force Threat and Risk Report
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Read Now


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 22, 2009

MOST-READ STORIES

  1. Dell buying Perot Systems for $3.9 billion
  2. WiMAX in 2010: Too little, too late?
  3. 10G Ethernet shakes net design to the core
  4. Apple decision on Google Voice was made by senior execs
  5. Microsoft's CodePlex Foundation has credibility issues already
  6. Are netbooks ready for the enterprise?
  7. An amazing laptop recovery story
  8. Cisco also backs flattening of data center networks
  9. 10 NASA space technologies that may never see the cosmos
  10. Facebook will shut down Beacon to settle lawsuit

Live Event: Enterprise Database Security
Make the most of your existing resources without draining your IT budget with a successful database security strategy. Join Industry experts, including Noel Yuhanna, Principal Analyst at Forrester Research for this live event scheduled for Thursday, September 24 at 2 p.m. ET / 11 a.m. PT to learn how. Protect your enterprise assets and ensure regulatory compliance.
Register for this Live Event now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: