Search This Blog

Thursday, July 16, 2009

CSH5 discussion group Opens for business

Shiny new Space Fence to monitor orbiting junk, satellites; PCI council publishes wireless security guidelines for payment cards
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by Palo Alto Networks
rule

It's Time to Fix the Firewall
It's time to fix the firewall and re-establish it as the cornerstone of enterprise network security. Discover how the next generation of firewalls increases visibility and control, and reduces risk. See how this new breed streamlines and simplifies an infrastructure, resulting in reduced complexity and cost.

rule

Spotlight Story
CSH5 discussion group Opens for business

The Computer Security Handbook, Fifth Edition (CSH5) edited by Seymour Bosworth, M. E. Kabay and Eric Whyne was published in February 2009 and we've already found mistakes! Oy gevalt ("Woe is me" in Yiddish). You can humiliate the editors even further with your very own contributions of typographical errors, infelicitous phrases, unclear paragraphs, and obsolete references. Just join the new CSH5_Discussion group on Yahoo and pitch in! Read full story

Related News:

Shiny new Space Fence to monitor orbiting junk, satellites
The new Space Fence system will provide better accuracy and faster detection while allowing us to increase the number of satellites and other space objects that can be detected and tracked, thus avoiding collision and damage to other satellites,

PCI council publishes wireless security guidelines for payment cards
Any business accepting credit and debit cards -- and using or considering wireless LANs -- should carefully review the recommendations for use of 802.11 wireless access points that are detailed in the guidelines issued Wednesday by the Payment Card Industry Security Standards Council.

E-commerce industry opposes new Indian online security rules
A decision by India's central bank to mandate another level of authentication for card use for online transactions will deter such transactions in the country, according to an association of India's e-commerce industry.

Firefox 3.5's first vulnerability 'self-inflicted,' says scientist
Mozilla has confirmed the first bug in the Firefox 3.5 browser that was launched about two weeks ago.

Attacks against unpatched Microsoft bugs multiply
Attacks exploiting the latest Microsoft vulnerability are quickly growing in quantity and intensity, several security companies warned today as they rang alarms about the developing threat.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

Keeping Up - and Keeping Secure - With Access Control
Today's distributed enterprises need an access control system that can keep up with the shifting demands that come with mobility and anywhere, anytime access. Get help with access control requirements from industry leader Juniper Networks in this exclusive special briefing.
Click here to learn more.


 

July 16, 2009

TOP STORIES | MOST DUGG STORIES

  1. Best Buy calls Twitter a job qualification
  2. 2. Invisible IPv6 traffic poses serious network threat
  3. How to use electrical outlets and cheap lasers to steal data
  4. Test: Best hypervisors for the desktop
  5. 11 security companies to watch
  6. The 10 dumbest mistakes network managers make
  7. Cisco expected to guillotine more employees this Thursday
  8. Microsoft officially names Geneva project
  9. Microsoft Office 2010: A simple FAQ
  10. Five biggest IPv6-based threats facing CIOs

Web Application Security without Compromise
Web applications are vulnerable in custom application logic, the underlying software platform as well as Web services. Learn how to protect your network against application-level attacks such as SQL injection, cross-site scripting and worm infections.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: