Search This Blog

Thursday, October 29, 2009

NIST SP800-53 Rev. 3: Risk Management Framework Underpins the Security Life Cycle

12 mad science projects that could shake the world; Internet phone systems become the fraudster's tool
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Trend Micro
rule

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.

Read More

rule

Spotlight Story
NIST SP800-53 Rev. 3: Risk Management Framework Underpins the Security Life Cycle

SP 800-39 also provides guidance for managing risk associated with the development, implementation, operation, and use of information systems. Read full story

Related News:

12 mad science projects that could shake the world
From robots that eat and shrink to invincible soldiers and smart drones, advanced science projects will alter our universe

Internet phone systems become the fraudster's tool
Cybercriminals have found a new launching pad for their scams: the phone systems of small and medium-sized businesses across the U.S.

Google Apps scores in LA, with assist from Microsoft
Los Angeles City Council approved a US$7.25 million five-year deal Tuesday in which the city will adopt Gmail and other Google Apps.

IT Security Outsourcing in Decline
Seventh Annual Global Information Security Survey: Companies that once outsourced many IT security controls have opted to do more in-house. A look at what caused the shift. (Third in a four-part series)

Targeted attacks possible in the cloud, researchers warn
The use of virtualization by cloud service providers to host virtual machines belonging to multiple customers on a shared physical infrastructure is opening up fresh data leak risks, a research report warns.

Dasient spots 640,000 malware-infected Web sites
Security start-up Dasient says more than 640,000 Web sites out of about 5.8 million pages were infected with malware between July and September of this year.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Top to Bottom Performance Management Excellence at the City of Chicago
In this featured City of Chicago case study, learn how the City's performance management efforts leveraged BIRT Performance Scorecard to: Save $10 million by improving their management of Overtime through Performance Management, break down departmental silos by facilitating cross-communication and consolidating financial payment processes and unify the performance management efforts of 36 city departments. Attend this web seminar to receive a complimentary copy of the City of Chicago case study.
Click here to register today.


Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More

 

October 29, 2009

MOST-READ STORIES

  1. They're kicking our butts at Trivial Pursuit
  2. EFF fights 'censorship' with Takedown Hall of Shame
  3. Economy plays a role in decisions around migrating to Win 7
  4. Two-factor authentication: Pros and cons
  5. Will the Cisco ASR kill the Juniper MX960?
  6. Windows 7 endless reboot answer evades Microsoft
  7. Verizon Droid FAQ: What we know so far
  8. Cisco buying Web security firm ScanSafe for $183 million
  9. A pre-Halloween treat: Roto-Rooter's 'The Raving' turns 30
  10. Win 7 upgrade paralyzes some PCs

Laptop Security Redefined
A laptop for "the whole team," that's what Lenovo created with the new ThinkPad T400. It takes thin and light to a new level, but even more compelling; it creates a new standard for laptop security. Lenovo provides manageability to remotely manage PCs for the diagnosis, isolation and healing of threats even when the PC is powered down. There's also a "poison pill" to deactivate a stolen notebook even if it's off the network.
Learn more.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: