Search This Blog

Tuesday, March 22, 2011

Should you stop using RSA SecurID tokens?

Cisco has long history with VPNs | The clock is ticking for encryption

Network World Security

Forward this to a Friend >>>


Should you stop using RSA SecurID tokens?
Anyone using RSA SecurID two-factor authentication tokens for remote access to sensitive information should reconsider using them until RSA, which last week admitted to a major breach of its network, clarifies exactly what was compromised, says NSS Labs. Read More


WHITE PAPER: BMC

A Proactive Approach to Enterprise Cloud Computing
Read more to learn about Business Service Management solutions that provide the visibility and automation IT needs to address cloud challenges. Read More

WHITE PAPER: EMC

Stay Ahead of Data Protection Challenges
If you still yearn for an infrastructure that can handle unpredictable data growth and enable you to enhance service levels, while ensuring data protection, read this ESG white paper. Learn how EMC is helping businesses completely transform their data protection processes. Read more now. Read now

Cisco has long history with VPNs
In 1999, Network World tested a dozen VPNs, with a product from Altiga Networks coming in tied for second place. Our main complaint was the lack of split-tunneling capability, a feature that was quickly added. Read More

The clock is ticking for encryption
In the indictment that led to the expulsion of 10 Russian spies from the U.S. last summer, the FBI said that it had gained access to their encrypted communications after surreptitiously entering one of the spies' homes, where agents found a piece of paper with a 27-character password. Read More

'Rogue' game server admins defend hosting on company gear
They say it's a perk and harmless ... as long as they're carefulBack in January, I wrote about a group of Scandinavian gamers who hijacked a New Hampshire medical center's server and bandwidth to host their "Call of Duty: Black Ops" sessions, which resulted in some 230,000 patients having their personal information put at risk. Read More


WHITE PAPER: CA

Magic Quadrant for User Provisioning
According to Gartner, there is no "one size fits all" user provisioning solution. This Gartner Magic Quadrant highlights key differentiators when selecting a user provisioning solution and provides a comprehensive overview and ranking of the top 18 vendors in this market. Read Now

NASA wants revolutionary radiation shielding technology
Long term exposure to radiation is one of the biggest challenges in long-duration human spaceflights and NASA is now looking for what it called revolutionary technology that would help protect astronauts from the deadly matter. Read More

Watchdog to Obama: Schmidt policing online privacy is like Madoff heading SEC
Will Eric Schmidt go from being Google CEO to being Obama's voice on privacy as the next Commerce Secretary? After running Google for ten years, there is little doubt that Eric Schmidt knows the ins and outs of technology and all about successfully managing a massive business. However, signs indicate that Schmidt may step into the upcoming vacancy as Commerce Secretary because current Secretary Gary Locke is becoming U.S. ambassador to China. Read More

The network's role in improving application security, reliability and efficiency
Access to data center resources needs to be fast, secure and reliable, a significant challenge for the data center network infrastructure. Read More


WHITE PAPER: Dell

How to Choose a Qualified Security Assessor
The selection of a Quality Security Assessor (QSA) will have a long and lasting impact on security and compliance for companies subject to PCI DSS compliance. This paper highlights guidelines for choosing a QSA firm in light of new regulations and refinements of PCI DSS v2.0. Learn more.

Cisco unveils secure teleworker products
Cisco introduced four devices aimed at improving the performance and security of home offices used by corporate workers. Read More

Google Voice gets into Sprint Mobile phones
Google Voice can replace existing Sprint phone numbersGoogle today said it had integrated its Voice application with Sprint Mobile phones, making it the first time the company has partnered with a mobile carrier to incorporate the Voice package. According to Google, Sprint customers will be able to use their existing Sprint mobile number as their Google Voice number and have it ring multiple other phones simultaneously. Read More

Proxy configurations: The lesser of two evils
As we tested the IronPort S-Series, we quickly ran into an old and unsolved problem with enterprise Web proxies: how to get end user browsers to actually use the proxy. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Perks drive up pay for tech CEOs
Many tech vendors have shied away from extravagant perks, but there are still plenty worth highlighting. Like a $1.5 million tab for home security. Or how about the $36,619 one company paid to reimburse its CEO for the taxes he had to pay on the $106,589 he gained by using company aircraft for personal flights? Read on to find out which tech CEOs enjoyed the priciest perks in 2010 and which ones went to work perk-free.

First look at Microsoft Internet Explorer 9
Microsoft has a real competitor once again with IE9, released at midnight Monday night on Windows 7 and Vista after several months of beta testing. The focus is on speed, privacy and simplicity, with a stripped-down interface, tracking protection, pinned sites, jump lists and enhanced support for HTML5.

MOST-READ STORIES

  1. AT&T's $39 billion T-Mobile buyout raises questions
  2. Phone maker publicly says 'No' to WP7
  3. Did hackers nab RSA SecurID's secret sauce?
  4. Cisco sets the bar for mobile security
  5. The RSA hack FAQ
  6. Cell phones are 'Stalin's dream'
  7. AT&T's takeover of T-Mobile creates largest U.S. carrier
  8. Four steps to take if you depend on RSA SecurID tokens
  9. RSA's SecurID breach: What should you do?
  10. On the company dime: Rogue game server admins tell all

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: