newsletters on Monday, May 28, in observance
of Memorial Day. This newsletter will be published
on Tuesday, May 29.
========================================================================
SECURITY REPORT
http://www.infoworld.com/
========================================================================
Monday, May 21, 2007
* Microsoft, TCG get closer on NAC
* Symantec: Chinese hackers grow in number, skills
* Alcatel-Lucent reports employee data lost or stolen
* Deepwater churns around unencrypted data
* Estonia recovers from massive denial-of-service attack
* Secunia: Firefox users more likely to install patches
* Symantec sues distributors for alleged fake software
* Amazon preps DRM-free music store
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT
ENDPOINT SECURITY: IT'S MORE THAN JUST ENCRYPTING BITS ON DISKS!
Securing data-at-rest requires enough flexibility to accommodate
today's workforce dynamics (all devices, users, and locations) while
consistently enforcing security rules-easily and painlessly-with no
compromise to user experience. Four requirements can help ensure
mobile data encryption as an integral part of your enterprise's
overall security processes. Download whitepaper.
http://newsletter.infoworld.com/t?ctl=178F23B:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
INFOWORLD ZERO DAY PODCAST
Covering business and IT strategies for securing the enterprise,
InfoWorld's Bob Garza covers anti-spam, anti-spyware, application layer
security, biometrics, digital identity, intrusion detection, malware and
more Sponsored by IronPort.
http://newsletter.infoworld.com/t?ctl=178F232:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
========================================================================
MICROSOFT, TCG GET CLOSER ON NAC
The Trusted Computing Group (TCG) is tying its authentication software
standard to Microsoft's proprietary network access protection platform
-- a move that leaders in the network access control (NAC) segment tout
as a major step toward getting products made by different vendors to
work together.
http://newsletter.infoworld.com/t?ctl=178F22E:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
========================================================================
SYMANTEC: CHINESE HACKERS GROW IN NUMBER, SKILLS
China's hacking scene appears poised for growth, as the number of
Internet users rise with a commensurate interest in criminal hacking and
government spying, according to a new Symantec study.
http://newsletter.infoworld.com/t?ctl=178F22C:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
========================================================================
ALCATEL-LUCENT REPORTS EMPLOYEE DATA LOST OR STOLEN
A CD containing personal information about thousands of
Alcatel-Lucent employees and their dependants has been lost or
stolen, the company said on Thursday.
http://newsletter.infoworld.com/t?ctl=178F231:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT
ENDPOINT SECURITY: IT'S MORE THAN JUST ENCRYPTING BITS ON DISKS!
Securing data-at-rest requires enough flexibility to accommodate
today's workforce dynamics (all devices, users, and locations) while
consistently enforcing security rules-easily and painlessly-with no
compromise to user experience. Four requirements can help ensure
mobile data encryption as an integral part of your enterprise's
overall security processes. Download whitepaper.
http://newsletter.infoworld.com/t?ctl=178F23B:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
========================================================================
DEEPWATER CHURNS AROUND UNENCRYPTED DATA
The most sensitive and highly classified data communicated over the
nation's internal computer networks remains at risk for exposure,
according to key witnesses in the government's investigation into the
United States Coast Guard's Deepwater procurement program.
http://newsletter.infoworld.com/t?ctl=178F22A:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
========================================================================
ESTONIA RECOVERS FROM MASSIVE DENIAL-OF-SERVICE ATTACK
A spree of denial-of-service (DOS) attacks against Web sites in Estonia
appears to be subsiding, as the government calls for greater response
mechanisms to cyber attacks within the European Union.
http://newsletter.infoworld.com/t?ctl=178F22B:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
========================================================================
SECUNIA: FIREFOX USERS MORE LIKELY TO INSTALL PATCHES
Firefox users have something new to brag about. Security vendor Secunia
reports that users of the open-source browser are more likely to have
installed the latest security updates than Web surfers running Internet
Explorer or Opera.
http://newsletter.infoworld.com/t?ctl=178F22D:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
========================================================================
SYMANTEC SUES DISTRIBUTORS FOR ALLEGED FAKE SOFTWARE
Symantec is suing eight businesses for allegedly selling counterfeit
software, the security vendor said Wednesday.
http://newsletter.infoworld.com/t?ctl=178F230:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
========================================================================
AMAZON PREPS DRM-FREE MUSIC STORE
Amazon.com will open an online music store whose songs will not carry
copy-protection technology, the Seattle e-tailer announced Wednesday,
confirming a move that had recently been rumored.
http://newsletter.infoworld.com/t?ctl=178F22F:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
======================================================================
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT
ENDPOINT SECURITY: IT'S MORE THAN JUST ENCRYPTING BITS ON DISKS!
Securing data-at-rest requires enough flexibility to accommodate
today's workforce dynamics (all devices, users, and locations) while
consistently enforcing security rules-easily and painlessly-with no
compromise to user experience. Four requirements can help ensure
mobile data encryption as an integral part of your enterprise's
overall security processes. Download whitepaper.
http://newsletter.infoworld.com/t?ctl=178F23B:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
DAILY NEWS, DELIVERED TO YOUR COMPUTER, MP3 PLAYER OR CELL PHONE
The InfoWorld Daily podcast provides readers with
up-to-the-minute news and features that shape the world
of enterprise IT. Tom Sullivan reports on the leading news
and events that shape the today's IT community.
http://newsletter.infoworld.com/t?ctl=178F233:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
======================================================================
ADVERTISE
To advertise, contact Kate_Hobbie@infoworld.com.
======================================================================
UNSUBSCRIBE/MANAGE NEWSLETTERS
To subscribe, unsubscribe or change your e-mail address for any of
InfoWorld's e-mail newsletters, go to:
http://newsletter.infoworld.com/t?ctl=178F234:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
Contact Customer Service at: customerservice@infoworld.com
To view InfoWorld's privacy policy, visit:
http://newsletter.infoworld.com/t?ctl=178F236:20920CD98AAF82DD44C97489635E38FAEFF29049075316B4
Copyright (C) 2007 InfoWorld Media Group.
501 Second St., San Francisco, CA 94107
This message was sent to: security.world@gmail.com
No comments:
Post a Comment