Search This Blog

Tuesday, November 03, 2009

Extensive Catalog Provides Security Controls for Contemporary Security Requirements

UTM performance: The yo-yo effect; Microsoft Patch Tally: 6 Years, 745 Vulnerabilities
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by WatchGuard
rule

The WatchGuard ROI Calculator
It is the most comprehensive and customizable ROI calculator available for network security. This web-based tool let's you add up all the hidden expenses your current network security setup is costing you. Then learn just how easily you can reign in those costs with an affordable WatchGuard solution.

Click here to download.

rule

Spotlight Story
Extensive Catalog Provides Security Controls for Contemporary Security Requirements

In the current Revision 3 update of SP 800-53 there are over 200 security controls for protecting information and information systems. Read full story

Related News:

UTM performance: The yo-yo effect
In our testing of the SonicWALL TZ200 and TZ210 systems, we discovered a significant performance impact when UTM features were enabled on typical Internet traffic.

Microsoft Patch Tally: 6 Years, 745 Vulnerabilities
In six years of monthly Patch Tuesdays, Microsoft has issued 400 security bulletins that address 745 vulnerabilities, an informal tally shows.

Q&A: Don't judge Microsoft security by the number of Patch Tuesday bulletins
Don't judge Microsoft security on the number of monthly patches, says Steve Lipner, senior director of security engineering at Microsoft's Trustworthy Computing Group. Microsoft has made a lot of progress with its Security Development Lifecycle and continues to improve the process, he said.

FBI: Ex- CEO of YouSendIt charged in denial of service of attack
Well that's one way to kill your business. The former CEO of Web 2.0 service company YouSendIt was indicted by a federal grand jury this week with four counts of mail fraud.

FTC delays identity theft protection rules till June 2010
Well, maybe the fourth time will be the charm.  This time the Federal Trade Commission said it delayed the enforcement of its Red Flags identity protection rules until June 1, 2010 at the request of Congressional members.  At the request of Members of Congress, the Federal Trade Commission is delaying enforcement of the "Red Flags" Rule until June 1, 2010, for financial institutions and creditors...

Typewriter puts identity thieves in Federal prison

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Why the Branch Office No Longer Needs IT
Is your business ready for managed services? Can you mitigate the potential risk and loss of data for access to business information and applications? What services should you consider outsourcing to a managed services provider and what can you do to mitigate the potential for loss? This webcast will address the current state of the market for branch office focused managed services and provide insights and considerations into managed services that you should be considering.
Click here to learn more.


FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process.
Click here.

 

November 03, 2009

MOST-READ STORIES

  1. EFF fights 'censorship' with Takedown Hall of Shame
  2. Verizon expands Droid invasion with Eris
  3. After one year, Conficker infects 7 million computers
  4. Cisco's data center guru talks direction, strategy
  5. Verizon Droid FAQ: What we know so far
  6. 12 mad science projects that could shake the world
  7. Microsoft Linux: Why one free software advocate wants it
  8. Is John Chambers an investor's nightmare?
  9. Review: Apple Snow Leopard Server
  10. Motorola Droid vs. Apple iPhone 3GS

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.
Learn more



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: