Search This Blog

Tuesday, November 10, 2009

Detailing contingency planning

Microsoft releases security guidelines for Agile; Cisco MARS shuts out new third-party security devices
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by IBM
rule

Virtualization Strategy for Mid-Sized Businesses:
As data mounts, small and midsize businesses cope with a sprawling and often costly infrastructure. This paper shows how these businesses can benefit by implementing a virtualization strategy. A well-executed strategy can result in fewer, better-utilized servers, rapid provisioning of servers, affordable business continuity, and more streamlined, efficient management.

Learn more now!

rule

Spotlight Story
Detailing contingency planning

Despite the inclusion of "for Federal Information Systems" in the title, SP 800-34 Rev 1 has a great deal of value for all information assurance and business continuity specialists. Read full story

Related News:

Microsoft releases security guidelines for Agile
Microsoft will release on Tuesday guidelines for developers building online applications and for those utilizing the Agile code-development process.

Cisco MARS shuts out new third-party security devices
Cisco has finally publicly acknowledged it won't add support for new third-party devices to its security information and event monitoring appliance, ending months of speculation about the future of its Monitoring, Analysis and Response System. Some claim it's the beginning of the end for MARS as a multi-vendor SIEM device.

CA looks to ease encryption key management
CA today unveiled key-management software that helps automate the storage and distribution of encryption keys for multi-vendor tape encryption purposes.

eEye scans for vulnerabilities, compliance problems
A new compliance and security management tool from eEye Digital Security can help ensure endpoint computers satisfy regulatory requirements.

FAA streamlines experimental space flight access
The Federal Aviation Administration today said it would streamline the environmental review part of permit applications for the launch and/or reentry of reusable suborbital rockets to help bolster a fledgling commercial space market.

Lawsuit claims iPhone games stole phone numbers
Browse the App Store for developer Storm8's many popular iPhone games, and you'll encounter the same message over and over again: "The item you've requested is not currently available in the US store."

Jailbreaking puts iPhone owners at risk, says researcher
Jailbroken iPhones are much easier to hijack, security researcher Charlie Miller said today, and the proof is in the ikee worm that has infected some Australian phones.

Mozilla fixes Firefox crash bug
Just a week after it last updated Firefox, Mozilla has rushed out a new version of its browser to fix a crash bug that programmers inadvertently introduced.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Protecting Your Intellectual Property
Learn about the growing threat of insider data theft, the extent to which most companies are vulnerable, and how McAfee security products enable businesses to protect their most valuable asset-their data.
Click here.


FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process.
Click here.

 

November 10, 2009

MOST-READ STORIES

  1. Is the Cisco MARS mission going to abort?
  2. First iPhone worm spreads Rick Astley wallpaper
  3. 10 stunning 3D buildings made with Google SketchUp
  4. Open source software ready for big business
  5. Four reasons to buy (and one reason to avoid) the Droid
  6. Vendors scrambling to fix bug in 'Net's security
  7. Lamp hijacks electricity from unused telephone jacks
  8. AT&T sues Verizon over TV ads
  9. Microsoft Linux: Why one free software advocate wants it
  10. Volpi bragged he could get Cisco's top stars to jump ship

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: