Search This Blog

Thursday, September 03, 2009

Red Hat bolsters system management tools; Microsoft SQL Server vulnerability exposes passwords; Sentrigo offers a patch

Red Hat bolsters system management tools; Microsoft SQL Server vulnerability exposes passwords; Sentrigo offers a patch
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by APC
rule

Optimizing the Data Center
The Editors of Network World present this Executive Guide: Taking Virtualization Up a Notch. Read it and find out what you need to know about virtualization as it creeps into every corner of your data center.

Learn more

rule

Spotlight Story
After code released, Microsoft to patch IIS bug

One day after a security researcher published attack code for a flaw in Microsoft's IIS server software, Microsoft said it plans to patch the issue. Read full story

Related News:

Red Hat bolsters system management tools
Chicago – Red Hat Wednesday released the latest version of its system management tools, the first version based on its year-old open source project Spacewalk project.

Microsoft SQL Server vulnerability exposes passwords; Sentrigo offers a patch
Sentrigo has posted a fix for a Microsoft SQL Server vulnerability that reveals passwords to anyone with administrative privileges.

Spam's Hidden Victims: Mobile Users
Spam costs organizations $712 per employee/per year, according to Nucleus Research. However, these staggering numbers don't even take into consideration one of spam's latest victims: enterprise mobile users. Spam targeted at smart phones is on the rise and becoming a growing security and productivity concern.

Privacy, consumer groups want news laws to protect Web users
A coalition of 10 U.S. privacy and consumer groups has called for new federal privacy protections for Web users, including a requirement that Web sites and advertising networks get opt-in permission from individuals within 24 hours of collecting personal data and tracking online habits.

RSA publishes virtualization security, compliance guidelines
RSA today published security and compliance recommendations for virtualization products. The guidelines focus primarily on optimizing use of management and security tools available from VMware parent company EMC and EMC's RSA security division.

3Com unifies networking and security hardware, management
3Com is kicking off a new integration of security and networking with the introduction in the U.S. of firewall/VPN gear it has sold in China for months.

Making Sense of the Snow Leopard Security Debate
Snow Leopard is out and users seem generally satisfied with the latest version of the Mac OS X operating system. The release hasn't been without some controversy though, part of which has been the debate over the malware protection features Apple included in Snow Leopard.

Human and computer viruses are both security risks
In any case there is likely to be a lot of additional employees wanting to, or needing to, work from home. Are you ready?

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 03, 2009

TOP STORIES | MOST DUGG STORIES

  1. Raytheon snaps up Internet pioneer BBN Technologies
  2. The 11 most influential microprocessors of all time
  3. Developer denies software to beat Chinese censors is malicious
  4. Cisco, EMC starting new joint venture company?
  5. Wi-Fi encryption cracked in 60 seconds
  6. Half of new servers are virtualized, survey finds
  7. 12 cool ways to donate your PC's spare processing power
  8. Still trying to crack Nazi Enigma messages
  9. Snow Leopard vs. Windows 7
  10. 12 words you can never say in the office

IDC ROI Calculator for IBM Tivoli Netcool
This ROI calculator from IDC will help you quickly and easily understand the average annual benefit that you may be able to achieve using IBM® Tivoli® Netcool®. The tool and underlying calculations and metrics are based on IDC research of 14 IBM Tivoli Netcool implementations.
Read Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: