Search This Blog

Friday, August 20, 2010

How to roll out full disk encryption on your PCs and laptops; What is 802.1x?

Network World Compliance - Newsletter - networkworld.com
How to roll out full disk encryption on your PCs and laptops | The world's geekiest tournaments

Network World Compliance

Forward this to a Friend >>>


What is 802.1x?
Understanding what the IEEE 802.1x standard is and why you should care means understanding three separate concepts: PPP, EAP and 802.1x itself Read More


RESOURCE COMPLIMENTS OF: IBM


IBM Rational® AppScan® can help you discover vulnerabilities in your Web applications and meet compliance requirements including PCI requirements. You'll receive white papers, demos, podcasts and additional information on the benefits of testing your Web applications. And after testing is complete, IBM can recommend ways to make them more secure. Download your complimentary e-Kit now.

In this Issue


WHITE PAPER: Oracle

Defense-in-Depth Solutions for Security and Compliance
Learn how Oracle Database Security products are designed to work transparently, minimizing any impact on existing applications while addressing requirements found in many regulations. Oracle Database Security products provide defense-in-depth security by addressing the three layers of security: encryption & masking, access control, and monitoring. Read Now.

How to roll out full disk encryption on your PCs and laptops
Hardly a week goes by when some organization or another doesn't lose some laptops and face a litany of IT security questions.. One that always comes up: Were the systems encrypted? Read More

The world's geekiest tournaments
"Rock-Paper-Scissors World Champion" and other dubious honors…We humans are competitive creatures. We compete over food, money, mates and social status. In fact, we're so competitive that when we run out of serious things to compete over, we start competing over trivial nonsense. Most often, such trivial nonsense tends to fall on the geekier side of the spectrum – in other words, anything involving elf mages, killer robots or alien warlords is likely to inspire a pointless competition somewhere at some point in time. In this slideshow, we'll examine the seven geekiest competitions out there today, from battling robots to competitive hand gesturing. Read More

Intel to buy McAfee in $7.68B blockbuster
Intel (INTC -- NASDAQ) said Thursday morning it has entered into an agreement to acquire McAfee (MFE -- NYSE) for approximately $$7.68 billion, based on a price of $48 per share. Read More

Secure and share sensitive documents in your extended enterprise
Every organization has documents it needs to keep confidential, even as they must be developed or shared among several people. Traditional document management systems provide these capabilities, but such a system may be overkill when you only have a small number of documents that need such special treatment. Brainloop Secure Dataroom is a SaaS application that addresses the challenges of sharing and securing confidential documents in the extended enterprise. Read More

Needed: Better emergency playbook for DDoS attacks
Akamai says DDoS attacks are growing steadily more vicious, aided by massive botnets. At Metricon 5, a senior service line manager warned that companies are short on emergency response playbooks to meet the threat. Read More

Search engine optimization techniques for hackers
At DefCon, Barracuda Labs will explain how malware pushers use search engine optimization techniques to push their poison to the top of those Google rankings. Read More


WEBCAST: Zenprise

Top Tips for Securing iPhones and iPads in the Enterprise
Attend this informative webinar to learn how you can manage, monitor and secure employee-liable iPhones and iPads in the workplace. Learn More

Zenprise extends security controls to employee-owned iPhones, other devices
Can you manage and secure an employee-owned mobile device that's accessing your corporate network? Zenprise has added a trio of new features to its MobileManager software for just this purpose. Read More

Panel drafts privacy recommendations for health data exchanges
A "tiger team" that advises the federally charted Health IT Policy Committee will submit a list of recommendations on Thursday for ensuring the privacy and security of personally identifiable health information in Health Data Exchanges. Read More

Cameron Diaz could wreck your PC, McAfee warns
Cameron Diaz's next film could easily be titled 'There's Something About Malware.' Diaz tops McAfee's annual ranking of the most dangerous celebrity searches on the Internet. Read More

Making Sense of the Intel McAfee Purchase
Intel and McAfee shocked the tech world this morning with the announcement that Intel is acquiring McAfee for 7.7 billion dollars. The initial reaction from analysts and industry experts is confusion--or maybe cautious skepticism--as the tech world tries to understand how a company synonymous with processors and computer chip technology will make use of a major security software and services organization. Read More

Intel drawn to vibrant security software market
Despite a lackluster economy, the worldwide security software industry just keeps growing. Led by Symantec, McAfee, Trend Micro, IBM and EMC, total industry sales are projected to hit at least $16.5 billion this year, up 11.3% from 2009, according to Gartner. Read More

Intel-McAfee deal could spark shareholder lawsuits
Shareholder lawsuits may be looming over the proposed Intel acquisition of McAfee, with at least two law firms signaling they are looking into whether McAfee's board of directors acted in the best interests of shareholders in approving the deal. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Proposing a secure global opt-out list
In my last column, I raised the issue of the difficulty we e-mail recipients have of getting off all the lists controlled by legitimate e-mail distribution firms. Today I propose a way to reach that goal. Read More

HP nabs Fortify Software for code security
It might lack a fulltime CEO but HP still has an open wallet. The company has announced its intention to buy software assurance company Fortify Software. Read More

Facebook Warns of Clickjacking Scam
Security firm Sophos recently discovered a new clickjacking scam on Facebook that spreads via the social network's "share" feature and could be costing you $5 a week. The new malware is similar to a so-called "likejacking" worm discovered last May. But instead of exploiting Facebook's "Like" button, the new scam uses the "Share" feature that posts content to your profile wall where your friends are encouraged to click on it. Read More

Data breach demonstrates need for access control policies
A big thanks to Quest's Jackson Shaw for pointing us to a story in the Vancouver (BC) Sun at the end of July. Under the headline "Tax collector accessed private files for gain," the newspaper reported that "A tax collector in B.C. [British Columbia, Canada] used the Canada Revenue Agency's computers to look up the private tax files of hundreds of high-income individuals, apparently in the hopes of hitting them up for a business she ran on the side, according to internal government documents." Read More

How to Spot Facebook Scams Like 'Dislike'
Like many scams on Facebook, the "Dislike" button succeeded because people are gullible. Here's how to not become one of those people. Read More

Hacked smartphones pose military threat
Hacked smartphones could endanger troops by sending location data to the enemy using mechanisms similar to those employed by recently discovered Android malware, experts say. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: RIM BlackBerry Torch 9800 vs. Apple iPhone 4
Apple's iPhone has reinvented the mobile phone, while the longtime smartphone king, the venerable BlackBerry, has been slow to change. Now, Research in Motion has updated the BlackBerry to incorporate modern touch capabilities while remaining very much a BlackBerry. Here's how the two devices compare in everyday usage.

Hands-On Tour: Google Goggles Visual Search
Google Goggles -- not to be confused with Google Mail Goggles, the company's inebriated e-mailing preventer -- lets you search from your cell phone simply by snapping a photo. Want more info on a product? Take its picture. Need info about a business? Photograph the storefront. Put simply, this thing packs some serious power, and its capabilities stretch far.

MOST-READ STORIES

  1. The audacity of Warner Brothers and re-spawning zombie cookies
  2. Intel to buy McAfee in $7.68 billion blockbuster
  3. The Web is dead. Who cares?
  4. Windows in the cloud: long boot times, other difficulties
  5. Cisco praised by Sen. Schumer for not abusing H1B visas
  6. Android 2.2: How to install Flash on Froyo
  7. Five billionth device about to plug into Internet
  8. I quit! 8 dramatic ways to leave your job
  9. Android 2.2 on Motorola Droid: First impressions of Froyo
  10. Has the mouse outlived its usefulness?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: