Search This Blog

Tuesday, December 18, 2007

Federal News Radio spotlights security

Security Strategies Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Federal News Radio spotlights security

M. E. Kabay By M. E. Kabay
Sometimes hearing the subtleties of a person's voice communicates even more than a well-written summary of their thoughts. Federal News Radio (FNR) has a resource for anyone who likes to learn from such interviews. Read full story

M. E. Kabay, PhD, CISSP-ISSMP is Program Director of the Master of Science in Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site.

MORE STORIESARROW


SPONSORED BY SOPHOS INC.
rule

Whitepaper: Learn how NAC Keeps Rogue PCs at Bay
Find out how you can reduce your company's risk stemming from unauthorized end-points on your network with NAC technology. Read this whitepaper to learn how NAC integrates with existing network-based security enforcement tools to create a safer environment. Learn more today.

rule
RELATED NEWS:

Hack this school network, win a router
There's a wireless router gathering dust in Bob LaRocca's office. It's yours if you can hack into his network.

Unix admin tried to axe power grid
A California man pleaded guilty Friday to charges that he shut down the data center responsible for managing the state's electrical supply.

After attacks, Apple fixes QuickTime bug
Apple has released a new security patch for QuickTime, its eighth update this year for the media player software.

French Embassy Web site for Libya said to be serving up malware
The French Embassy Web site for Libya has been compromised and is serving up malware, McAfee says

Properly handling end-of-life IT assets
With major OEMs arguing about who recycles the most electronics and with e-waste legislation on the rise across the world, green computing is a hot topic. However, many companies are still in the dark about how to properly get rid of old IT equipment ...

How to manage your multivendor firewalls like a pro
Auditing firewalls to keep regulators happy and tracking rule changes - especially for businesses buying firewalls (compare products) from multiple vendors - is a burden that a variety of third-party software can lighten dramatically.

Employee charged with stealing millions in computer gear
A former employee of a scientific test equipment maker is charged with stealing millions of dollars of computer parts, possibly to resell on eBay.

Botnet-controlled Trojan robbing online bank customers
A new variant on the Prg Trojan, designed in Russia, is hitting victims to steal money from their banking accounts in the United States, United Kingdom, Spain and Italy, says Atlanta-based security firm SecureWorks.


THE FASTEST FIREWALLS
Clear Choice Test  Crossbeam, IBM win raw performance test; Juniper scores on price.

HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

SPONSORED BY SOPHOS INC.
rule

Whitepaper: Learn how NAC Keeps Rogue PCs at Bay
Find out how you can reduce your company's risk stemming from unauthorized end-points on your network with NAC technology. Read this whitepaper to learn how NAC integrates with existing network-based security enforcement tools to create a safer environment. Learn more today.

rule

Holiday Tech Toys
Stumped on what gadgets and gizmos to give this holiday? Have no fear, Cool Tools' Keith Shaw is here. We do all of the heavy lifting of wading through hundreds of submitted technology products to find the very best holiday gift ideas. Click here to view our holiday gift guide: http://www.nww.com/PSA2_1210

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

12/18/07

TODAY'S MOST-READ STORIES:

  1. Xbox signal jamming WLANs
  2. Feds are dropping the ball on IPv6
  3. Cisco opening up IOS
  4. Unix admin tried to axe power grid
  5. Sun, ex-staffers in war of words
  6. Guru predicts last-minute IPv6 switch
  7. Trojan robbing online bank customers
  8. Google develops Wikipedia rival
  9. Boosting cell signals indoors
  10. The nine worst Microsoft products


TOP 100 OF 2007


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Strategies Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: