Search This Blog

Tuesday, April 07, 2009

Star in your own hacking video!; The Sound of Y2k; Two IE8 security secrets

Budget approval technique No. 1: Whitehat hacking your environment
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by F5 Networks
rule

7 Key Challenges You Can't Ignore
Virtualization platforms, such VMware ESX and Microsoft Hyper-V, represent the first form of virtualization that is typically introduced into the data center. While these new infrastructure platforms provide considerable advantages; virtual machines (VMs) also add complexity, scale, and management challenges to your environment. By planning for your migration to virtual machine platforms, and recognizing the inherent challenges, you can make it seamless and optimize your virtual network and storage environment.

rule

Spotlight Story

Need a bigger security budget? Star in your own hacking video!
By Cisco Security Expert Jamey Heary
Over the years I've assisted many security directors in their process of justifying new security projects and budgets. I've seen countless techniques used by security teams in an effort to free up hard to attain dollars for security projects. There are two techniques I've seen work with a very high degree of success that I wanted to pass along to you all. Let’s start with the one that you have probably thought of, but most likely have never followed through with. Read more.

Related News:

The Sound of Y2k Can you hear it? Amid the deafening silence that was the the Conficker nonevent of April Fools' Day, you should be able to detect an echo from the past. It started as a quiet murmur, but over time, it will build to a crescendo that could make Conficker the most dangerous malware IT has ever seen.

Two IE8 security secrets users should love Some of Internet Explorer 8's tricks take some digging to find. Product tester Thomas Powell offers two security tips for IE8.

Yet another government attempt at cybersecurity The timing of two cybersecurity bills just introduced by Sen. John D. Rockefeller IV (D-W.Va.), Sen. Olympia Snowe (R-Maine) and Sen. Bill Nelson (D-Fla.) seems a bit funny. It is not so much that they were introduced on April Fools’ Day; more importantly, they were introduced before the widespread review of U.S. cybersecurity ordered by President Obama is completed by Melissa Hathaway, acting senior director for cyberspace for the National Security and Homeland Security Councils.

Trend Micro expands SaaS security strategy Trend Micro Monday expanded its software-as-a service strategy to reach a wider range of business customers while taking steps to keep its reseller channel in the fold.

UTM Appliances: How to Choose 'Em and Use 'Em To protect networks and information against increasingly sophisticated threats, many organizations are deploying security in layers. Some are finding that an efficient way to do this is by using unified threat management (UTM) appliances.

Start-up HyTrust debuts policy enforcement for VMware Start-up HyTrust unveils its first product, a policy-enforcment appliance for VMware ESX servers and VirtualCenter.

IT Was Ready for A Conficker Attack An expected April 1 activation of the Conficker.c worm passed without incident, calming widespread fears that the Internet was in danger of attack.

Security vendors unperturbed by Internet filter trial Potential misconceptions over the Federal Government's contentious Internet filtering scheme will not affect demand for filtering software, according to security vendors and distributors.

Kaiser Fires 15 for Peeking At Octuplet Mom's Records In the latest example of employee data-snooping, a Kaiser Permanente hospital located in a Los Angeles suburb has fired 15 workers and reprimanded eight others for improperly accessing the medical records of Nadya Suleman, the California woman who gave birth to octuplets in January.

Cisco gets it right with CCNA:Security Cisco Subnet blogger Andrew Whitaker thinks the company is heading in the right direction by stepping up the security angle of it CCNA certification.

Cisco's key to physical security Cisco Subnet blogger Andrew Whitaker reminisces about his lock-picking adventures as he looks at some of Cisco's physical security solutions.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by F5 Networks
rule

7 Key Challenges You Can't Ignore
Virtualization platforms, such VMware ESX and Microsoft Hyper-V, represent the first form of virtualization that is typically introduced into the data center. While these new infrastructure platforms provide considerable advantages; virtual machines (VMs) also add complexity, scale, and management challenges to your environment. By planning for your migration to virtual machine platforms, and recognizing the inherent challenges, you can make it seamless and optimize your virtual network and storage environment.

rule

Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free

 

04/07/09

Today's most-read stories:

  1. Netscape alums tackle cloud storage
  2. Afraid of losing your job to a younger, cheaper IT worker?
  3. Bill would give Obama power to shut down Internet
  4. IBM, Sun unable to reach a deal, report says
  5. Cries of protest, censorship greet news of cybersecurity bill
  6. Five best router and switch features you never use
  7. Top 10 technology skills
  8. Microsoft says phones are bad
  9. Cisco.com domain name about to expire soon
  10. Economy forcing 'spoiled' generation to grow up
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Complimentary DNS newsletter
Sign-up today and receive the latest DNS news and analysis. This newsletter provides deep insight into this murky area and offers ways to understand and mitigate risk with better management and control of your domain, email and DNS.
Sign up now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: