Thursday, May 07, 2009

Increasing Internet security for average users

Security starts with ordinary users
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Enhance Performance, Security, Stability
Upgrading to the Windows Server 2008 OS can offer myriad advantages, including enhanced performance, security, and stability. By following best practices for in-place upgrades and taking advantage of tools such as the Dell Windows Server 2008 Readiness Advisor, administrators can help ensure a smooth migration on their Dell PowerEdge(TM) servers.

rule

Spotlight Story
Increasing Internet security for average users

M. E. Kabay By M. E. Kabay
Boyle: One day, while working hard as the chief information security officer at an insurance company, I realized that much of our organization's network security was in the hands of ordinary users of our computers. No matter how much my team did to safeguard our customers' confidential data, no matter how much money we spent on our mission, all it would take was one average Internet-using employee to cause major damage, either deliberately or accidentally. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

New Institute for Cyber Security advances research, development of security technologies In November, the University of Texas at San Antonio (UTSA) launched its new Internet security incubator at the Institute for Cyber Security (ICS). The incubator was developed to commercialize promising technologies ...

Pay as you go for security solutions Antivirus and Internet security software vendor ESET will now allow end-users to pay as they go with its first foray into software as a service.

U.S. plots major upgrade to Internet router security The U.S. federal government is accelerating its efforts to secure the Internet's routing system, with plans this year for the Department of Homeland Security to quadruple its investment in research aimed at adding ...

Six worst Internet routing attacks Here's our list of the biggest security incidents involving the Internet's core routing protocol, the Border Gateway Protocol. Some of these incidents were attacks; others were accidental misconfigurations. But all of ...

4 open source BGP tools The U.S. Department of Homeland Security is funding the following industry and academic groups involved in developing open source tools aimed at securing the Internet's Border Gateway Protocol-based routing.

In the Trenches, as the Threats Evolve Recent security incidents at my company have gotten me thinking about the state of information warfare. Electronic break-ins are progressing in a direction that makes me fear that the nature of the threats is changing.

'Managing' passwords doesn't make them less unsafe In his newsletter last week my colleague M.E. Kabay points us to a draft release of a new paper from the National Institute of Standards and Technology (NIST) called the "Guide to enterprise password management."

Why mix Bluetooth with Wi-Fi? When the latest version of Bluetooth was announced last week, two questions popped to mind. First, what does Bluetooth 3.0 - which combines the Bluetooth wireless communications protocol with 802.11g Wi-Fi transport ...

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Dell
rule

Enhance Performance, Security, Stability
Upgrading to the Windows Server 2008 OS can offer myriad advantages, including enhanced performance, security, and stability. By following best practices for in-place upgrades and taking advantage of tools such as the Dell Windows Server 2008 Readiness Advisor, administrators can help ensure a smooth migration on their Dell PowerEdge(TM) servers.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

05/07/09

Today's most-read stories:

  1. Domain name company cries croc tears over 'censorship'
  2. Why BlackBerry still beats iPhone for some
  3. Death of the mouse
  4. Leaked copies of Windows 7 RC contain Trojan
  5. RIM to bind BlackBerry to Cisco phones
  6. Top 7 reasons people quit Linux
  7. Citrix embraces Apple with iPhone virtualization
  8. Give users passwords they don't have to remember
  9. Cisco cool to Obama's tax loophole plan
  10. Use the Cisco restroom at your own risk
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment