Search This Blog

Tuesday, November 03, 2009

FTC delays identity protection rules till June 2010

New Security Features in Cisco IOS 15.0; Extensive Catalog Provides Security Controls for Contemporary Security Requirements
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Palo Alto Networks
rule

Gartner Next-Gen Firewall Recommendation
Gartner just published a research note, "Defining the Next-Generation Firewall," which lays out the definition, the requirements, and their recommendations for next-generation firewalls in the enterprise. If you are refreshing your firewall or IPS, you must read this report. Download a free copy now.

Click to continue

rule

Spotlight Story
FTC delays identity protection rules till June 2010

Well, maybe the fourth time will be the charm. This time the Federal Trade Commission said it delayed the enforcement of its Red Flags identity protection rules until June 1, 2010 at the request of Congressional members. Read full story

Related News:

New Security Features in Cisco IOS 15.0
Cisco's newly released ISR G2 routers come with a new update to their software features in IOS version 15.0. I will focus on describing some of the new security features that are found in the IOS 15.0 security feature set. It is important to note that IOS 15.0 will work on older ISR models as well as the new ISR G2 platforms. This is a straightforward list with a description of each new feature....

Extensive Catalog Provides Security Controls for Contemporary Security Requirements
In the current Revision 3 update of SP 800-53 there are over 200 security controls for protecting information and information systems.

UTM performance: The yo-yo effect
In our testing of the SonicWALL TZ200 and TZ210 systems, we discovered a significant performance impact when UTM features were enabled on typical Internet traffic.

Microsoft Patch Tally: 6 Years, 745 Vulnerabilities
In six years of monthly Patch Tuesdays, Microsoft has issued 400 security bulletins that address 745 vulnerabilities, an informal tally shows.

eBay phishing scam scariest email blunder of 2009
The eBay email fraud campaign, which took place in May this year, and aimed to get users of the online auction site to disclose their bank details has been named this year's scariest email blunder by Proofpoint.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.


FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process.
Click here.

 

November 03, 2009

MOST-READ STORIES

  1. EFF fights 'censorship' with Takedown Hall of Shame
  2. Verizon expands Droid invasion with Eris
  3. After one year, Conficker infects 7 million computers
  4. Cisco's data center guru talks direction, strategy
  5. Verizon Droid FAQ: What we know so far
  6. 12 mad science projects that could shake the world
  7. Microsoft Linux: Why one free software advocate wants it
  8. Is John Chambers an investor's nightmare?
  9. Review: Apple Snow Leopard Server
  10. Motorola Droid vs. Apple iPhone 3GS

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.
Learn more



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: