Network World on Twitter Get our tweets and stay plugged in to networking news. 15 real ways to secure teleworkers Security continues to be one of the top bugaboos to letting employees telecommute. As gas prices have stayed high and the economy continues to drive itself into the ground, telecommuting continues to be a viable and cost-effective way for companies to keep employees connected to the home office, but at what price? Lost laptops? Network hacks? Stolen data? Spammers Play to Recession Fears, Emotions Spammers are using the current shaky economic conditions to their advantage, according to information released Tuesday by Symantec in its February 2009 MessageLabs Intelligence Report. VeriSign: We will support DNS security in 2011 VeriSign has promised to deploy DNS Security Extensions – known as DNSSEC – across all of its top-level domains within two years. Gov't CIO survey: Cybersecurity still needs work Cybersecurity continues to be a top concern among U.S. government CIOs, but agencies are still falling short of achieving good security results, according to a new survey of top government IT officials. Check Point overhauls its security software architecture Check Point is in the midst of a major overhaul of its security software architecture so customers can pick and choose the applications they want and dedicate computing... Laid-off Workers as Data Thieves? When the depths of the economic crisis became clear last September, public relations firms started using it as an opportunity to drum up publicity for their security vendor clients. One PR flak even started her e-mail pitch to me with an admission that the IT angle was a stretch. Why Information Must Be Destroyed The inability to discard worthless items even though they appear to have no value is known as compulsive hoarding syndrome. If the eccentric Collyer brothers had a better understanding of destruction practices, they likely would not have been killed by the very documents and newspapers they obsessively collected. Secure Passage releases a new version of its firewall-analysis tool Secure Passage is rolling out a news version of its firewall analysis and compliance-verification software that identifies unintentionally allowed risky behavior on business networks. Adobe flaw has been used in attacks since early January A dangerous and unpatched vulnerability in Adobe's PDF-reading software has been around a lot longer than previously realized. Attackers targeting unpatched vulnerability in Excel 2007 Microsoft's Excel spreadsheet program has a 0-day vulnerability that attackers are exploiting on the Internet, according to security vendor Symantec. How a small company caused Internet disruption In a startling demonstration of exactly how little it can take to disrupt the Internet, a relatively innocuous network configuration update by a small Czech company last... Cell phone security Computer scientists Wayne Jansen and Karen Scarfone of the Computer Security Division of the Information Technology Laboratory at the National Institute of Standards and Technology (NIST) have written a new (October 2008) Special Publication entitled "Guidelines on Cell Phone and PDA Security," which summarizes the security issues and provides recommendations for protecting sensitive information carried on these devices. February giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here. |
No comments:
Post a Comment