Guidelines for securing IEEE 802.11i wireless networks A useful free document, one not requiring registration and having 162 pages, is "Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i," which is Special Publication 800-97 from the National Institute of Standards and Technology. The Habit: or There and Back Again to the NISTy Mountains Like Bilbo Baggins of Bag End, Hobbiton, whose story "There and Back Again" I have read and reread with pleasure over five decades, I find myself returning many times to favorite haunts such as the NIST list of Special Publications to see how my old friends are doing with their books of wisdom and dragon-slaying lore. NSA identifies top 25 programming errors The National Security Agency, working with MITRE Corp., SANS, and dozens of industry experts from many other organizations, has published a valuable list of the top 25 most dangerous programming errors. Is compliance with standards achieving the goal of protecting data? The prevalence of data theft has led to increased enforcement of compliance with standards to protect data - surely a Good Thing, right? Well, maybe not in the way compliance is sometimes being enforced. Longtime colleague Bob Gezelter contributes his thoughts today on the unreasoning application of security standards. Podcast: Why ex-employees are stealing your data Dr. Larry Ponemon talks with Tim Greene about a study that showed 59% of employees who had quit, were fired or laid off admitting to stealing company data. What's being stolen? How can companies stop this? Ponemon and Greene discuss these issues. (15:09) 10 Steps for Mitigating Data Risk During a Merger Merger and acquisition activity stands to increase as global markets struggle to stay afloat during the worst economic slowdown in decades. What will you do when you find out you're about to acquire or consolidate with another firm or division? Are you aware of the risks you may be inheriting? What data is going to demand the highest availability? What IT regulations will you have to address and how do you know if existing controls already address them? Arrests soar after new wiretap law Criminal arrests made under more powerful wiretapping laws have increase by 96% following reforms that make it easier for police to intercept and access telecommunications. February giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here. |
No comments:
Post a Comment