Monday, October 03, 2005

Cisco pushes new security software

All the week's news and views about Security, 10/03/05
_______________________________________________________________
This newsletter sponsored by Check Point
VoIP Security without the Nightmare

Find out if VoIP will jeopardize your security! Check Point
delivers intelligent VoIP security that keeps your VoIP system
safe without the need to reorganize your entire security policy.
Download a free white paper to learn how Check Point can protect
your VoIP investment.
http://www.fattail.com/redir/redirect.asp?CID=116700
_______________________________________________________________
HOW WILL YOU HANDLE YOUR GROWING NETWORK LOAD?

InfiniBand, EtherFabric and iWarp are all high-speed
interconnect technologies aimed at offloading network
connections from server CPUs. And the buzz on them is picking up
as users look for alternatives to 10G Ethernet to handle their
growing network loads. What questions should you ask about these
new technologies? For more, click here:
http://www.fattail.com/redir/redirect.asp?CID=116085
_______________________________________________________________

Network World's Security News Alert

Cisco pushes new security software, 10/03/05

Cisco last week introduced software products aimed at letting
users squash virus and worm traffic at the front door - incoming
LAN switch or WAN router ports.
<http://www.networkworld.com/nlsecuritynewsal7949>

Security, strategy concerns delay enterprise wireless device
rollouts, 10/03/05

Lack of a coherent IT strategy, concerns about security, and a
poor understanding of the benefits of wireless technology
retards enterprise wireless device rollout
<http://www.networkworld.com/news/2005/100305-ctia.html?nl>

Consumers snub security notifications, 10/03/05

A recent study of 9,200 consumers showed 11% received
notifications from companies informing of security breaches
affecting them. Of that slice, 39% thought the notification was
spam or junk mail, and 5% retained lawyers.
<http://www.networkworld.com/nlsecuritynewsal7950>

ISS upgrades vulnerability service, 10/03/05

Company equips customers with external and internal scans for
immediate protection from threats.
<http://www.networkworld.com/news/2005/100305-iss.html?nl>

Management Strategies: Managing remote users via centralized
servers, thin clients, 10/03/05

Data center consolidation appears to be an ever-increasing
strategy for managing remote users, IT managers say, as concerns
for data security, reliability and availability of assets
continue to pervade enterprise networks.
<http://www.networkworld.com/careers/2005/100305man.html?nl>

Radware bolsters net services, 10/03/05

This week, and in the coming months, Radware is expected to
launch a collection of products aimed at helping users handle
all aspects of higher-level network services, including
application acceleration, security, WAN optimization and
traffic-processing offload.
<http://www.networkworld.com/news/2005/100305-radware.html?nl>

Poll: Security tops LAN switch purchase considerations in '06,
10/03/05

Security, standards compliance and price/performance are key
aspects for IT professionals when choosing a LAN switch vendor,
according to a recent survey.
<http://www.networkworld.com/nlsecuritynewsal7951>

Symantec buys BindView Development for $209 million, 10/03/05

Symantec Monday anounced it plans to buy security compliance
software vendor BindView Development for $209 million in cash.
<http://www.networkworld.com/nlsecuritynewsal7952>

Westinghouse tightens security, 10/03/05

To combat viruses and spyware, Westinghouse Electric has rolled
out desktop software that watches for suspicious code activity
and blocks it based on behavior.
<http://www.networkworld.com/nlsecuritynewsal7953>

Espion upgrades e-mail encryption, 10/03/05

E-mail security vendor Espion International last month released
a dual-key system for encrypting e-mail that works with the
company's product gateway appliance or as a stand-alone.
<http://www.networkworld.com/news/2005/100305-espion.html?nl>

Weblog: Academic incentive, 10/03/05

The International Information Systems Security Certification
Consortium ( ISC2 ) is offering $50,000 in scholarships to
post-grad students who are conducting information security
research projects.
<http://www.networkworld.com/weblogs/careers/010080.html?nl>

Spear phishers target victims with specific campaigns, 09/30/05

According to Peter Cassidy, secretary general of the
Anti-Phishing Working Group, spear phishers act much like
marketers, crafting a message and then directing it to just the
right people.
<http://www.networkworld.com/nlsecuritynewsal7954>

Novell downplays server hack, 09/30/05

An internal Novell investigation of an apparent hack involving
one of its computers revealed that the incident was less serious
than was described by the security consultant who reported it to
the company, a spokesman said Friday.
<http://www.networkworld.com/nlsecuritynewsal7955>

Hackers fail to break into Via's StrongBox, 09/30/05

Hackers at a security conference in Malaysia failed to break
into Via Technologies' StrongBox security application during a
competition, Via officials said Friday, but the company gathered
some valuable feedback from participants.
<http://www.networkworld.com/nlsecuritynewsal7956>

Online safety threats lurk in instant messages, 09/30/05

By now you know to be leery of e-mail attachments, even when
they seem to come from a friend or colleague. These days,
however, you also have to be careful of IM attachments and links
- because the virus writers are already there, too.
<http://www.networkworld.com/nlsecuritynewsal7957>

Newsletter: Bluefire VPN development kit lets users combine
security with mobility, 09/29/05

Bluefire Security is coming out with a software developer's kit
that lets customers write VPN security into mobile applications.

<http://www.networkworld.com/nlsecuritynewsal7958>

The top 5: Today's most-read stories

1. How to solve Windows system crashes in minutes
<http://www.networkworld.com/nlsecuritynewsal7602>
2. Verizon CTO lays out next-gen network plans
<http://www.networkworld.com/nlsecuritynewsal7959>
3. McAfee, Omniquad top anti-spyware test
<http://www.networkworld.com/nlsecuritynewsal6949>
4. Digging out new rootkits
<http://www.networkworld.com/nlsecuritynewsal7960>
5. Skype: Hazardous to network health?
<http://www.networkworld.com/nlsecuritynewsal7851>

_______________________________________________________________
To contact:

Senior Editor Ellen Messmer covers security for Network World.
Contact her at <mailto:emessmer@nww.com>.
_______________________________________________________________
This newsletter is sponsored by Sybase

It sounds so simple: if you collect enough business information,
you'll glean valuable insights that can drive both revenue
growth and competitive advantage. Along the way, however,
companies are discovering that managing the explosive growth of
online data can prove a formidable challenge. Here's how to
assess your data management style, and maximize your
opportunities to turn online data into business opportunity.
Click here for more on taming the data explosion.
http://www.fattail.com/redir/redirect.asp?CID=116674
_______________________________________________________________
ARCHIVE LINKS

Security research center
Latest security news, analysis, newsletters and resource links.
http://www.networkworld.com/topics/security.html
_______________________________________________________________
This newsletter sponsored by Nortel
Building the Mobile Enterprise Online Expo

The workplace is changing rapidly. Employees need to be
untethered from their desks while remaining connected and
accessible. This online event helps you solve your enterprise
mobility challenges by bringing together industry leaders,
including Nortel's CTO and CIO and RIM's VP Enterprise Systems,
to discuss the hottest topics in enterprise mobility. Broadcast
live to your desktop on Nov. 8, 2005. Register today!
http://www.fattail.com/redir/redirect.asp?CID=116686
_______________________________________________________________
FEATURED READER RESOURCE

The Trend Micro Threat Map

The Trend Micro Threat Map dynamically displays real-time data
to show worldwide trends in virus and content security threats
as they happen. Collected from actual computer infections, the
Threat Map can be used to help determine appropriate security
policies, based on the prevalence of threats that can adversely
affect your business.

<http://www.networkworld.com/go/trendmicro/trend_frr>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

No comments:

Post a Comment