Monday, June 01, 2009

Obama steers cybersecurity changes;Secure those iPhones

Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Splunk
rule

Easily Harness, Analyze, Manage Data
Working with any application, server or network device, Splunk collects, stores, indexes and secures massive amounts of data, allowing you to search, alert, report and analyze IT activities. What used to take hours or days now takes minutes, eliminating costly, inefficient silos.

rule

Spotlight Story
Obama announces new cybersecurity direction

Grant Gross By Grant Gross
U.S. President Barack Obama will appoint a government-wide cybersecurity coordinator and elevate cybersecurity concerns to a top management priority for the U.S. government, he announced Friday. Read full story

Related News:

Secure those iPhones
The nonprofit Center for Internet Security today released what it termed the industry's only consensus security benchmark for the iPhone, which is aimed at helping IT managers and users reduce the risk of data stored on the device from being compromised.

Racism, hate, militancy sites proliferating via social networking
Rascism, hate, and militancy sites have tripled in number over the past year on the Web and within corners of social-networking sites like Facebook, YouTube, Google and Yahoo, according to one vendor tracking them. Websense is now tracking about 15,000 of these hate and militancy sites, with 1,000 added in just the first five months of this year.

Hardware and identity management
Those of you who know me know that I rarely get excited about hardware. And while I'll be telling you about two hardware companies in this newsletter, it isn't the hardware I want to talk about, but what these companies do with it. Switches, routers, firewall devices and network access control (NAC) have been with us for quite some time. But some companies are beginning to realize that the term "identity" when used in conjunction with these devices means more than an IP or media access control address.

Free hands-on Cisco router practice
Cisco Subnet blogger Wendell Odom explains how Dynamips software can be used to emulate Cisco routers and PIX firewalls.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Splunk
rule

Easily Harness, Analyze, Manage Data
Working with any application, server or network device, Splunk collects, stores, indexes and secures massive amounts of data, allowing you to search, alert, report and analyze IT activities. What used to take hours or days now takes minutes, eliminating costly, inefficient silos.

rule

Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now


Create Your Own Agenda at IT Roadmap
Customize a day of learning just for yourself! Attend IT Roadmap Conference & Expo and explore new solutions and examine new technology across 10 relevant areas of IT. Security, Virtualization, SaaS, VoIP, Green IT and more. 10 U.S. cities in '09.
Select your city, register and attend free!

 

06/01/09

Today's most-read stories:

  1. Windows 7 alluring, but XP is the migration factor
  2. Upcoming Palm Pre release puts Sprint turnaround plan in focus
  3. Apple's Woz loves Microsoft's new search engine, Bing
  4. Cisco's huge router reaches five-year milestone
  5. YouTube hit by porn storm
  6. Cisco enhances routers, switches for collaboration
  7. The rise of personal 'Mi-Fi' hotspots
  8. Wanted for hire: generalists, not IT specialists
  9. Catalyst 6500 has another decade or more left, Cisco hints
  10. Security, regulatory concerns slow some server virtualization efforts


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment