Search This Blog

Tuesday, September 29, 2009

The IA Professional's Toolkit Part 7

Security Strategies Alert - Newsletter - NetworkWorld.com
DHS privacy report: Laptop searches at airports infrequent; Watching the detectives bowl
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Sophos
rule

Is Anti-Virus Dead?
This paper discusses the security implications of modern threats, analyzes where emerging technologies can add real value, and highlights five key strategies for ensuring solid malware protection.

Learn more.

rule

Spotlight Story
The IA Professional's Toolkit Part 7

In this, the final segment of security consultant Gordon Merrill's series on fundamental management tools for IA professionals in general and IA security consultants in particular, we look at how to handle problems wisely. Read full story

Related News:

DHS privacy report: Laptop searches at airports infrequent
The U.S. Department of Homeland Security's annual privacy report card revealed more details on the agency's controversial policy involving searches of electronic devices at U.S. borders.

Watching the detectives bowl
Gibbs follows on from last week's column on surveillance with a tale of cops caught on video in a house search, the state of video surveillance in the UK, and wonders if our operating systems might be rigged …

Do phishers have more poles in the water?
Are phishing attacks going up or down? The answer depends on who you ask.

Watchdogs give NASA's manned space strategy gets harsh review
The folks at the Government Accountability Office have not been all that kind to NASA in recent years and today they issued another damming report on the future of the manned space flight program.

Data Destroyer Disk Wipe Ensures Your Privacy
Simply formatting a drive has never been enough to get rid of data completely; otherwise, data recovery specialists would be out of a job. That's where Data Destroyer Disk Wipe ($14, free demo) comes in. Not only does it erase data on a drive, it writes and rewrites over that data with random bytes, making the wiped data totally unrecoverable.

SMBs unprepared for disasters, Symantec finds
Small businesses shouldn't be so confident about their disaster recovery plans, survey founds.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

The Power of Virtualized Web Application Delivery
The increased dependency on Web applications has created greater complexity in the environment making availability, performance and security of Web applications an imperative. This white paper discusses how any size organization can tune its Web application delivery services with a virtualized solution that will meet the unique characteristics of each individual application.
Read More


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 29, 2009

MOST-READ STORIES

  1. Cell towers that blend vs. those that offend
  2. Microsoft, researchers release new operating system project
  3. Xerox will buy ACS for $6.4 billion
  4. AT&T accuses Google of violating telecom law
  5. To fight worms, use ants
  6. Judge berates Apple over Snow Leopard timing in Psystar case
  7. What to do about bandwidth hogs?
  8. Citrix planning major desktop virtualization push
  9. John Chambers slams Cisco with $2.3 million in private jet expenses
  10. Lotus goes after Microsoft's 'ridiculous and fabricated' figures

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: