All the week's news and views about Security, 10/24/05
_______________________________________________________________
This newsletter is sponsored by Tacit Networks
Download this Network World Executive Guide: Storage Trends and
Strategies
From simplicity to complexity, Storage has taken on more
responsibility involving security and many other top demands.
Explore the hottest trends in Storage today written by the
editors of Network World for IT professionals, in the following
Executive Guide and examine extended case studies of users and
advice from storage specialists. Register now and get your free
copy of Network Word's Storage Executive Guide.
http://www.fattail.com/redir/redirect.asp?CID=117919
_______________________________________________________________
MANAGEMENT FRAMEWORKS ARE OUT - BUT WHAT'S IN?
Many vendors stopped using the term "frameworks" when they
became synonymous with endless deployment cycles. So, if
management frameworks are out, what is the alternative? Does a
series of multiple products from multiple vendors work? Will
Configuration Management Database (CMDB) emerge as the new
"framework" or "platform" for the enterprise? Click here for
more:
http://www.fattail.com/redir/redirect.asp?CID=118215
_______________________________________________________________
Network World's Security News Alert
Acquisitions fill gaps in Symantec security line, 10/24/05
<http://www.networkworld.com/nlsecuritynewsal9445>
Symantec is still spending hundreds of millions of dollars
annually to develop new products, but the company recently
stepped up spending on acquisitions as well to bolster its
offerings.
Symantec testing database security appliance, 10/24/05
<http://www.networkworld.com/nlsecuritynewsal9446>
Engineers within Symantec's R&D organization have built an
appliance that could eventually lead the company into the
database security business.
Net access control on tap from Juniper, 10/24/05
<http://www.networkworld.com/nlsecuritynewsal9447>
Juniper Networks this week plans to unveil a policy management
appliance, a key piece of a secure network access scheme
designed to rival those of Cisco and Microsoft.
Gartner event focuses on security, 10/24/05
<http://www.networkworld.com/nlsecuritynewsal9448>
With many keeping one eye on Hurricane Wilma churning off the
coast, 6,000 IT executives last week heard Gartner analysts
offer their vision on everything from security trends to
wireless network directions.
Plan for smooth recovery after breach, 10/24/05
<http://www.networkworld.com/nlsecuritynewsal9449>
Predefined response programs should be implemented before a
security incident occurs, say IT executives who have dealt with
public breaches and exposures of identity and financial data.
Responding to a security breach, 10/24/05
<http://www.networkworld.com/nlsecuritynewsal9450>
CIOs and network administrators offer tips about how to respond
following a network security breach.
Deciphering the world of crypto, 10/24/05
<http://www.networkworld.com/nlsecuritynewsal9451>
It's the computational magic for scrambling data to keep it
secret, and in the U.S., the best-known cryptographic algorithms
go by names such as Triple-DES and AES. But in other countries,
such as South Korea, Russia and Japan, it is SEED, GOST and ...
My adventures in anti-spam, 10/24/05
<http://www.networkworld.com/nlsecuritynewsal9452>
Five lessons learned when installing anti-spam software
School nixes malware with open source, 10/24/05
<http://www.networkworld.com/nlsecuritynewsal9453>
A team of IT staffers at the University of Indianapolis last
week showed off a bundle of open source tools and scripts it
uses to trap and isolate PCs infected by viruses or spyware
App IDS guards databases, 10/24/05
<http://www.networkworld.com/nlsecuritynewsal9454>
Application security implements traditional network- and
operating system-level intrusion-detection system concepts at
the database level
Banking regulators urge stronger authentication for online
accounts., 10/24/05
<http://www.networkworld.com/nlsecuritynewsal9455>
Federal regulators last week issued new Internet banking
standards that will require adoption of stronger authentication
methods by the end of next year.
Enterasys beefs up WLAN security, 10/24/05
<http://www.networkworld.com/nlsecuritynewsal9456>
Enterasys last week announced wireless LAN access points and a
wireless switch for controlling and securing Wi-Fi network
access.
ICMP packet surge from Exchange server, 10/24/05
<http://www.networkworld.com/nlsecuritynewsal9457>
Recently, I noticed that there has been a surge in ICMP packets
between some of my Active Directory controllers and Exchange
servers. Virus scanning proved that the servers were clean. Is
there any explanation for this phenomenon? - Alex Ang
Microsoft patch problems continue, 10/21/05
<http://www.networkworld.com/nlsecuritynewsal9458>
Windows users are continuing to experience problems with
Microsoft's latest round of security patches. This time a
problem with a critical patch relating to Microsoft's DirectShow
streaming media software is leaving some Windows 2000 users
unprotected ...
The top 5: Today's most-read stories
1. School traps infected PCs in its web
<http://www.networkworld.com/nlsecuritynewsal9459>
2. Cartoon of the Week
<http://www.networkworld.com/nlsecuritynewsal9460>
3. Cisco bets a billion dollars on India
<http://www.networkworld.com/nlsecuritynewsal9320>
4. Cisco finally brings security push to LAN
<http://www.networkworld.com/nlsecuritynewsal9145>
5. WiMAX just around the corner
<http://www.networkworld.com/nlsecuritynewsal9149>
_______________________________________________________________
To contact:
Senior Editor Ellen Messmer covers security for Network World.
Contact her at <mailto:emessmer@nww.com>.
_______________________________________________________________
This newsletter is sponsored by Checkpoint
VoIP Security without the Nightmare
Find out if VoIP will jeopardize your security! Check Point
delivers intelligent VoIP security that keeps your VoIP system
safe without the need to reorganize your entire security policy.
Download a free white paper to learn how Check Point can protect
your VoIP investment.
http://www.fattail.com/redir/redirect.asp?CID=118246
_______________________________________________________________
ARCHIVE LINKS
Security research center Latest security news, analysis,
newsletters and resource links.
<http://www.networkworld.com/topics/security.html>
_______________________________________________________________
FEATURED READER RESOURCE
Network World New Data Center: Spotlight on Advanced IP
Piecing Together the Next Generation IT Architecture. This 5th
installment in a 6 part series takes a look at at On-demand
services, automated management, and management technologies.
PLUS, see how two IT Execs are plotting their way to an all
IP-world. This NDC issue has it all, click here to read now:
<http://www.networkworld.com/supp/2005/ndc5/>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2
International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>
To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>
Subscription questions? Contact Customer Service by replying to
this message.
This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________
Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>
Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772
For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>
Copyright Network World, Inc., 2005
No comments:
Post a Comment