Search This Blog

Wednesday, December 09, 2009

Personalizing the Web browsing experience

McAfee appliance watches for network threats; 20 projects that kept NASA hopping in 2009
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by McAfee
rule

Secure in 15 - Start with Daily Practices
Get the Secure in 15 toolkit starting with the "15 Minutes Month-at-a-Glance" calendar. McAfee will send you additional tools and tricks to stay protected around the clock.

Click here to learn more.

rule

Spotlight Story
Personalizing the Web browsing experience

Kynetx co-founders Phil Windley (CTO) and Stephen Fulling (CEO) passed through last week but I did manage to grab a few words with them to see how the company, and the product (which I called "a greasemonkey-like scripting tool" last spring) were doing. Read full story

Related News:

McAfee appliance watches for network threats
McAfee Tuesday unveiled a security appliance designed to monitor internal corporate traffic flows for worms, viruses and botnet activity in order to block outbreaks traced to corporate computers.

20 projects that kept NASA hopping in 2009
From the space shuttle and Mars mission to water on the moon and ice on the Earth, NASA has its hands in a variety of critical projects

Social network and banking scams are on the rise, says Cisco
What do phishing, instant messaging malware, DDoS attacks and 419 scams have in common? According to Cisco Systems, they're all has-been cybercrimes that were supplanted by slicker, more menacing forms of cybercrime over the past year.

How to fight malware
Tests of five Web security gateways reveal that performing inline inspection of network traffic is a must, as is querying cloud-based databases of the latest malware. The current crop of anti-malware tools offers strong protection against spam, spyware, phishing, botnets, rootkits, viruses and other Internet-borne attacks.

Network IPS tests reveal equipment shortcomings
An independent test and evaluation of 15 different network intrusion-protection system products from seven vendors showed none were fully effective in warding off attacks against Microsoft, Adobe and other programs.

Novell grabs for big role in virtualization security
Novell this week will lay out an ambitious plan to secure applications across heterogeneous virtualization platforms at customer sites and off-premises, an effort designed to play off Novell's strengths in network and identity management.

Today from the Subnet communities

On Cisco Subnet: Cisco's SSL client will gain ScanSafe technology and Cisco, EMC venture preps for early Q1 launch; On Microsoft Subnet: Patch Tuesday: Six expected patches, two surprises; On Google Subnet: Chrome gains extensions, Mac, Linux versions

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More


When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.

 

December 09, 2009

MOST-READ STORIES

  1. How to fight malware
  2. iPhone winning over some corporate security skeptics
  3. The FCC seeks bids for white spaces service providers
  4. Cisco, EMC joint venture makes progress
  5. Network IPS tests reveal equipment shortcomings
  6. Will U.S. Supreme Court overhaul Sarbanes-Oxley?
  7. Can you work on a virtualized Windows desktop?
  8. Which OS is best for app development?
  9. Unconventional (but useful) input devices
  10. Man lost $127M at casinos owned by Cisco customer

Vulnerability Management Checklist
Discover the 12 key decision points you need to consider when choosing a vulnerability management solution. This checklist walks you step-by-step through critical questions to ensure you select the solution that will best protect your network and data.
Learn more now.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: