Search This Blog

Thursday, September 03, 2009

Military set to lay out $42M to develop advanced network prioritization, security technology; Data leakage prevention going mainstream

3Com unifies networking and security hardware, management; Military set to lay out $42M to develop advanced network prioritization, security technology
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by IBM
rule


To improve the security of web applications, it starts by building software securely. IBM Rational AppScan is a suite of Web application vulnerability scanners that include dynamic and static analysis capabilities. Now you can engage more testers earlier in the development cycle. Try it for yourself. Download and evaluation copy of IBM Rational AppScan.

Click to continue

rule

Spotlight Story
Pseudonymous critic impugns integrity of all security professionals

In a recent response to an article on hiring hackers, a pseudonymous critic calling itself "Secure network..." posted a comment entitled "so called hacking and security professionals." It started with the run-on sentence, "Of course someone calling them selves[sic] a 'security Professional' would be upset, it's job security they're losing...." Read full story

Related News:

3Com unifies networking and security hardware, management
3Com is kicking off a new integration of security and networking with the introduction in the U.S. of firewall/VPN gear it has sold in China for months.

Military set to lay out $42M to develop advanced network prioritization, security technology
BBN, which was bought by defense giant Raytheon today, got almost $11 million to help build self-configuring network technology that would identify traffic, let the network infrastructure prioritize it down to the end user, reallocate bandwidth between users or classes of users, and automatically make quality of service decisions.

Data leakage prevention going mainstream
Data leakage or data loss prevention systems have gradually entered the mainstream as their increasing maturity has allowed increasing adoption. From barely registering in our research two years ago, we now find different forms of DLP in about one-third of enterprises in Nemertes Research's spring 2009 benchmark study.

Symantec warning: Spam targeting your achy breaky heart
The information security gurus at Symantec Corporation have seen it fit to warn us all that spammers are now looking to con troubled lovers into parting with their personal information, at the very least, in return for a reversal of fortunes in their relationships. The company issued a five-point advisory for consumers to Computerworld Singapore on Tuesday, September 1, 2009:

VMware publishes virtualization security, compliance guidelines
VMware today published security and compliance recommendations for its virtualization products. The vendor's guidelines focus primarily on optimizing use of management and security tools available from VMware parent company EMC and EMC's RSA security division.

Catbird reports whether cloud security meets compliance standards
Catbird is adding a feature to its security platform that gives cloud users a reading on how well their data use complies with specific regulatory requirements.

Making Sense of the Snow Leopard Security Debate
Snow Leopard is out and users seem generally satisfied with the latest version of the Mac OS X operating system. The release hasn't been without some controversy though, part of which has been the debate over the malware protection features Apple included in Snow Leopard.

Human and computer viruses are both security risks
In any case there is likely to be a lot of additional employees wanting to, or needing to, work from home. Are you ready?

Privacy Office approves laptop searches without suspicion
Travelers arriving at U.S. borders may soon be confronted with their laptops, PDAs, and other digital devices being searched , copied and even held by customs agents -- all without need to show suspicion for cause.

Is your health privacy at risk?
The year's worst health information breaches, which compromised millions of patient records, show just how vulnerable health privacy is to hacker attacks.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Independent Test Results: Citrix vs. F5
Latency is an important metric when measuring Web applications. See the benchmark results from independent tester, Tolly, to learn how Citrix fared against F5 in a wide range of scenarios.
Learn More


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 03, 2009

TOP STORIES | MOST DUGG STORIES

  1. Raytheon snaps up Internet pioneer BBN Technologies
  2. The 11 most influential microprocessors of all time
  3. Developer denies software to beat Chinese censors is malicious
  4. Cisco, EMC starting new joint venture company?
  5. Wi-Fi encryption cracked in 60 seconds
  6. Half of new servers are virtualized, survey finds
  7. 12 cool ways to donate your PC's spare processing power
  8. Still trying to crack Nazi Enigma messages
  9. Snow Leopard vs. Windows 7
  10. 12 words you can never say in the office

Five Steps to Successful IT Consolidation
Mapping out a 5 step consolidation process can ensure that the goals of IT consolidation are achieved. Read this white paper to learn how to reduce IT management overhead, ease revision control, guarantee data security, scale systems more quickly and reduce server and software costs.
Click here to learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: