Tuesday, June 02, 2009

Dr. Johnston's Security Maxims: Sense and Humor

New travel rules kick in June 1 amid concerns over RFID-tagged passport cards; Obama outlines cybersecurity plans, cites cyberspace threat
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by IBM
rule

Failure to properly secure Web applications significantly impacts your ability to protect sensitive client and corporate data.
IBM Rational AppScan is an automated scanner that monitors, identifies and helps remediate vulnerabilities. Download a free trial of AppScan and see how it can help prevent against the threat of attack.

rule

Spotlight Story
Dr. Johnston's Security Maxims: Sense and Humor

Having graduate students is like having a thousand sets of eyes and ears: they are always noticing neat stuff and sending pointers that stimulate thought or – as often – cause delighted laughter. Read full story

Related News:

Spam Finds New Paths Into Corporate Nets
MessageLabs' monthly report on Internet threat trends found that more than 90% of e-mail sent to corporate networks in April was spam, up 5.1% from March.

New travel rules kick in June 1 amid concerns over RFID-tagged passport cards
New travel requirements go into effect June 1 at U.S. land and sea borders amid security concerns over an RFID-enabled passport card that has been approved for U.S. travelers.

Obama outlines cybersecurity plans, cites cyberspace threat
The nation's digital infrastructure is under grave threat from a range of adversaries and needs to be protected as a strategic national security asset, President Barack Obama said this morning at a news conference outlining his administration's proposals to secure cyberspace.

June Giveaways

Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.


Evolution of Ethernet
Evolution of EthernetFrom 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Optimizing IT Budgets
Discover how to help IT managers work within budget constraints by offering: Fast implementation, High Return on Investment (ROI), Low Total Cost of Ownership (TCO).
Optimizing IT Budgets


 

June 02, 2009

TOP STORIES | MOST DUGG STORIES

  1. Nine management apps that won't bust your budget
  2. The rise of personal 'Mi-Fi' hotspots
  3. Windows 7 alluring, but XP is the migration factor
  4. YouTube hit by porn storm
  5. 20 years after Tiananmen, China containing dissent online
  6. Ubuntu Desktop: Plenty of sizzle, not much steak
  7. Microsoft warns of DirectX attack on XP, WS2003 in the wild
  8. Bing: A visual tour of what's new
  9. Obama announces new cybersecurity direction
  10. Top four tips to fight off botnet denial-of-service attack

Managing Identity and Network Security
These days, both private and public sector organizations need their network to be as secure as possible because the attacks are coming from all sides. In this live webcast, June 9,2009, you'll discover how secure identity management cost-effectively delivers granular network protection, increases user productivity, satisfies regulatory compliance and decreases cost for IT organizations.
Register today!



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment