Search This Blog

Tuesday, February 17, 2009

The Habit: or There and Back Again to the NISTy Mountains

Into the NIST documents: Securing wireless systems
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Qualys
rule

Four Steps to Security Compliance.
Cost-effective software as a service (SaaS) is a unified approach for IT, audit and operation teams to ensure their company is complying with federal regulations and internal security policies. Discover the four keys to IT security compliance, which are: Defining, discovering, evaluating and remediating. Get all of the details today. Download this whitepaper now.

rule

Spotlight Story
The Habit: or There and Back Again to the NISTy Mountains

M. E. Kabay By M. E. Kabay
Like Bilbo Baggins of Bag End, Hobbiton, whose story "There and Back Again" I have read and reread with pleasure over five decades, I find myself returning many times to favorite haunts such as the NIST list of Special Publications to see how my old friends are doing with their books of wisdom and dragon-slaying lore. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Guide to NIST security documents One of the most valuable sources for downloading free, unbiased publications about security management is the Web site of the National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) ...

NIST guide to forensics in incident response As I mentioned in previous columns, there's a new set of draft documents from the Computer Security Resource Center of the National Institute of Standards and Technology (NIST). In addition, SP 800-86, Guide to ...

Criminals using Skype, say Italian police The Italian police force has become the latest to voice complaints that the Skype VoIP service is undermining their use of wiretapping in criminal investigations.

Hackers Attack Antivirus Firm's Tech Support Site A Kaspersky Lab technical support site was hacked late last month, exposing private customer information for 11 days, the Moscow-based security company admitted last week. The company learned of and closed the breach on Feb. 7 after it was notified by the Romanian hackers.

Private Twitter alternatives If you like the Twitter interface for connecting with office colleagues, but want to keep your posts private, there are a number a couple of options available for building an invite-only microblogging network.

Data Protection Law Amended, Deadline Extended (Again) The Massachusetts Office of Consumer Affairs and Business Regulation on Thursday issued amendments, and an extension, to the state's tough data security regulations, known as Mass. 201 CMR 17.

With global effort, a new type of worm is slowed There have been big computer worm outbreaks before, but nothing quite like Conficker.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Qualys
rule

Four Steps to Security Compliance.
Cost-effective software as a service (SaaS) is a unified approach for IT, audit and operation teams to ensure their company is complying with federal regulations and internal security policies. Discover the four keys to IT security compliance, which are: Defining, discovering, evaluating and remediating. Get all of the details today. Download this whitepaper now.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free

 

02/17/09

Today's most-read stories:

  1. Microsoft announces $250,000 Conflicker worm bounty
  2. Evolution of PCs, Macs, Internet, routing, cell phones, Microsoft Windows
  3. Palm pulls the plug on Palm OS, bets the future on Pre's webOS
  4. Largest coordinated ATM rip-off ever nets $9+ million
  5. Iridium calls may suffer outages from satellite crash
  6. Microsoft renames, expands free online services for higher-ed
  7. New amplifier paves way for 10Gbps wireless Web
  8. NSA identifies top 25 programming errors
  9. Rumor mill: Cisco to buy VMware?
  10. Did Borat help Cisco?


Product Guides
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Patch Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: