Thursday, April 23, 2009

Flaws in 'Internet SAFETY' bill

Unexpected consequences of required dynamic address allocation logging
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by NetScout
rule

Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.

rule

Spotlight Story
Flaws in 'Internet SAFETY' bill

M. E. Kabay By M. E. Kabay
Friend and colleague Robert Gezelter points to serious deficiencies in the thinking behind legislation currently under consideration in the House and Senate. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or
66.186.127.216 to your white-list file. Thank you.

Internet Safety Act: Rashomon in real time? From what you read in the trade press and blogosphere, you would think that Sen. John Cornyn and Rep. Lamar Smith have decided to use the excuse of fighting child pornography to attack the Internet itself.

The State of Spam 2009, Part 4 Jamie de Guerre, CTO of Cloudmark, talks about the latest anti-spam technologies coming out of Cloudmark's research labs.

The state of spam 2009, Part 3 Cloudmark CTO Jamie de Guerre continues his response to the question of what has changed in the battle against spam in the last year, discussing free content-hosting services, compromised accounts at Webmail providers and new-media spam.

The state of spam 2009, Part 2 Cloudmark CTO Jamie de Guerre: I think there have been several changes and a couple of events that happened in the past year that are interesting and will have an effect on how spam is sent in the coming year.

The state of spam 2009, Part 1 Spam - not SPAM the luncheon meat (and you have GOT to visit the official SPAM Web site, which plays like a parody the Monty Python crew might have dreamed up) - is a dreadful nuisance, with estimates that 95% of all e-mail in the world now consists of rubbish. Periodically I look into the state of the spam to see how the war is going.

Controversial Einstein systems to inspect U.S. government's Internet traffic The largest U.S. carriers -- including AT&T, Qwest and Sprint -- are deploying special-purpose, intrusion-detection systems dubbed Einstein boxes in their networks as part of...

Are We Already Losing the Cyber War? Wouldn't it be great to read on Xinhua, the Chinese news agency, reports that American cyber spies have penetrated the Chinese electric grid and may have left software behind that would allow Washington to plunge the People's Republic into darkness?

Government, military officials at RSA warn of cyber-threats Cybercrime and military cyber-defense plans were aired by U.S. government officials during the RSA Conference yesterday.

Prevent intrusions: What to look for In the Buying Tips section of our Product Guide, find 15 questions to ask about IPS before you buy one.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by NetScout
rule

Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/23/09

Today's most-read stories:

  1. Six things that could ruin Twitter (and five that won't)
  2. 100 Gigabit Ethernet: Bridge to Terabit Ethernet
  3. Apple iPhoneys: The 4G edition
  4. VMware vows to overhaul data center with "cloud operating system"
  5. The FBI as an ethical hacker?
  6. The biggest loser in Oracle-Sun deal: SAP
  7. Why the Oracle/Sun deal is bad news for Microsoft and SQL Server
  8. AT&T expands its contact center portfolio
  9. OpenSolaris, Linux could merge under Oracle
  10. Microsoft could be a winner in Sun-Oracle deal
  11. Honda demos motion-assistance devices


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment