Search This Blog

Monday, October 12, 2009

Secrecy vs. privacy

Engineers fix the shortcomings of the traditional firewall; Analysis: Phishing arrests highlight massive problem
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Fortinet
rule

Webcast: When Good Applications Go Bad
Register today to hear Andrew Jaquith, Senior Analyst at Forrester Research, and Anthony James, VP Products at Fortinet, discuss the challenges posed to enterprises by application security threats. Additionally, hear a customer testimonial on how CKE Restaurants, responsible for operating many of the USA's most popular quick-service and fast-casual dining restaurants, reduced the risk of application-borne threats.

Register now.

rule

Spotlight Story
Secrecy vs. privacy

When Bob Blakley talks, I listen. Blakley is vice president and research director for the Burton Group's Identity and Privacy Strategies. Before that he was chief scientist for security and privacy at IBM. He rarely speaks about identity and security issues without weighing all of the possibilities and coming to a reasoned conclusion. So when he says that an analyst from another organization is "dead wrong" you can bet he'll back it up with an elegant argument. Read full story

Related News:

Engineers fix the shortcomings of the traditional firewall
Do you find yourself putting a Band-Aid solution on a legacy firewall, such as strapping on an intrusion-prevention system here or antivirus software there? If the firewall is a security device, why should we have to surround it with other security devices to help it do its job? A group of security engineers addressed those shortcomings with a new kind of firewall built from the ground up.

Analysis: Phishing arrests highlight massive problem
The massive phishing scam broken up by federal authorities this week is only a hint at what many say is an insidious and growing problem on the Internet.

Hackers exploit year's fourth PDF zero-day
Adobe has acknowledged that hackers are exploiting bugs in its Reader PDF viewer and Acrobat PDF maker to break into Wndows-based PCs.

Kaspersky intros Kaspersky Anti-Virus for Mac
Kaspersky Lab has introduced Kaspersky Anti-Virus for Mac, which the company believes strengthens the security provided by Apple and offers a platform to add additional security modules as new threats emerge.

Google patches DoS vulnerabilities in Android
Researchers at the Open Source Computer Emergency Response Team disclosed two denial-of-service vulnerabilities in Google's Android 1.5 mobile phone platform, both of which have already been patched by the vendor.

Cisco extends security controls to 'dark Web'
Cisco is tackling the 'dark Web' of online content that's not easily indexed with new usage controls for its IronPort S-Series Web Security Appliances.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

Unifying Management Systems for Deep Savings
To deliver the availability and performance the business demands, network management teams need to optimize fault management, unify fault and performance management, automate change and configuration management, implement run-book automation, and deploy a configuration management system based on a federated CMDB. This integrated approach is called automated network lifecycle management and is outlined in this white paper.
Read Now


Protecting Against the New Wave of Malware
This white paper examines why older, traditional antivirus approaches don't work and why a new approach to endpoint security is required to better protect your company from malicious threats. Learn about the scope of the malware problem and strategies that can help you defend against evolving threats.
Learn More

 

October 12, 2009

MOST-READ STORIES

  1. One by one, carriers succumb to Google Voice
  2. Compromised e-maill accounts exploited in fake shopping scam
  3. How dangerous could a hacked robot possibly be?
  4. Six everyday iPhone disasters and how to handle them
  5. Ex-Nortel CEO seeks $12 million from bankrupt company
  6. First Windows 8 details emerge
  7. 7 keys to the ultimate smartphone
  8. Harvard's robotic bees generate high-tech buzz
  9. Cisco extends security controls to 'dark Web'
  10. 15 genius algorithms that aren't boring

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.
Learn more



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: