Tuesday, June 09, 2009

Consensus metrics for information security

10 things you didn't know about cyberwarfare; Court says government background security checks go too far
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by IBM
rule

Take a Holistic Approach to Business Security
Take a business-level view of security and risk management, so you can prioritize security activities and focus on those that make the most strategic sense. With this white paper, learn to direct resources to mitigate risk and costs, and see how IBM enterprise security can optimize business results.

rule

Spotlight Story
Consensus metrics for information security

On May 20, 2008, the Center for Internet Security (CIS) announced the public release of a set of metrics for information security. The organization is dedicated to helping "organizations reduce the risk of business and e-commerce disruptions resulting from inadequate technical security controls. Click Here to learn more about CIS's mission." Their charter was last updated in 2002 and is fully described online. Read full story

Related News:

Social Engineering: 5 Security Holes at the Office
If you think the biggest threat to your sensitive information lies in network security, think again. Once a criminal is inside a building, there are limitless possibilities to what that person can access or damage. Take a look at your building's security. How easy is it to get inside?

10 things you didn't know about cyberwarfare
Imagine a situation where a powerful country wants to annex its small neighbor, so it launches a week-long campaign of cyberattacks aimed at disrupting the financial, energy, telecom and media systems of its neighbor's biggest ally. A week later, the aggressor launches a full-scale cyberwar on its neighbor that includes air and naval defenses. With its ally's defenses weakened, the neighbor agrees to become a province of the aggressor in less than a week.

Court says government background security checks go too far
Can background checks go too far? The Ninth Circuit Court of Appeals apparently thinks so.

June Giveaways

Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.


Windows 7 + Windows Server 2008
Evolution of EthernetWe found 5 things to love and 5 things to hate about Microsoft's latest operating system versions.

Open-source management
Apple iPhoneys: The 4G editionHere are nine management apps that won't break the bank.

Keep Storage Costs in Check with Tape
The Clipper Group outlines the real costs of migrating to a disk-based storage. You will learn about the dramatic differences between tape-based and disk-based storage in regards to floor space, hardware and energy costs. Find out why tape storage, especially, LTO-4, should be part of your long-term storage plans.
Keep Storage Costs in Check with Tape


 

June 09, 2009

TOP STORIES | MOST DUGG STORIES

  1. New DOS attacks threaten wireless data networks
  2. 2009's summer smartphone blockbusters
  3. Cisco's take on 4G: It's all about video
  4. Juniper claims first with 100G Ethernet
  5. CIOs: Your networks have already been compromised
  6. T-Mobile net reportedly hit by hacker/extortion attack
  7. Bing vs. Google vs. Yahoo: Feature smackdown
  8. FTC shuts down notorious ISP
  9. Five things we love/hate about Win 7/Windows Server 2008 R2
  10. Nvidia overcomes bad graphics chips

Wired + Wireless: Smart Planning for New Network Infrastructures
Important considerations are needed in planning combined wired and wireless networks to optimize performance and reduce costs. When installing or upgrading a structured cabling plant, IT departments can achieve significant time and money savings by determining and integrating their Wireless LAN (WLAN) requirements right from the start.
Learn more



Inbox too cluttered?
Take our survey to help us improve how IT professionals get the information they need.
Click to take our survey


IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment