The Sound of Y2k Can you hear it? Amid the deafening silence that was the the Conficker nonevent of April Fools' Day, you should be able to detect an echo from the past. It started as a quiet murmur, but over time, it will build to a crescendo that could make Conficker the most dangerous malware IT has ever seen. Two IE8 security secrets users should love Some of Internet Explorer 8's tricks take some digging to find. Product tester Thomas Powell offers two security tips for IE8. Yet another government attempt at cybersecurity The timing of two cybersecurity bills just introduced by Sen. John D. Rockefeller IV (D-W.Va.), Sen. Olympia Snowe (R-Maine) and Sen. Bill Nelson (D-Fla.) seems a bit funny. It is not so much that they were introduced on April Fools’ Day; more importantly, they were introduced before the widespread review of U.S. cybersecurity ordered by President Obama is completed by Melissa Hathaway, acting senior director for cyberspace for the National Security and Homeland Security Councils. Trend Micro expands SaaS security strategy Trend Micro Monday expanded its software-as-a service strategy to reach a wider range of business customers while taking steps to keep its reseller channel in the fold. UTM Appliances: How to Choose 'Em and Use 'Em To protect networks and information against increasingly sophisticated threats, many organizations are deploying security in layers. Some are finding that an efficient way to do this is by using unified threat management (UTM) appliances. Start-up HyTrust debuts policy enforcement for VMware Start-up HyTrust unveils its first product, a policy-enforcment appliance for VMware ESX servers and VirtualCenter. IT Was Ready for A Conficker Attack An expected April 1 activation of the Conficker.c worm passed without incident, calming widespread fears that the Internet was in danger of attack. Security vendors unperturbed by Internet filter trial Potential misconceptions over the Federal Government's contentious Internet filtering scheme will not affect demand for filtering software, according to security vendors and distributors. Kaiser Fires 15 for Peeking At Octuplet Mom's Records In the latest example of employee data-snooping, a Kaiser Permanente hospital located in a Los Angeles suburb has fired 15 workers and reprimanded eight others for improperly accessing the medical records of Nadya Suleman, the California woman who gave birth to octuplets in January. Cisco gets it right with CCNA:Security Cisco Subnet blogger Andrew Whitaker thinks the company is heading in the right direction by stepping up the security angle of it CCNA certification. Cisco's key to physical security Cisco Subnet blogger Andrew Whitaker reminisces about his lock-picking adventures as he looks at some of Cisco's physical security solutions. April giveaways galore Cisco Subnet and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment