Friday, September 18, 2009

Security disaster averted by financial firm's quick actions; 802.1n Proves Standards Aren't What They Used To Be

802.1n Proves Standards Aren't What They Used To Be; NSS Labs to do more security-product testing without vendor funding
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile


Sponsored by McAfee
rule

Protecting Your Intellectual Property
Learn about the growing threat of insider data theft, the extent to which most companies are vulnerable, and how McAfee security products enable businesses to protect their most valuable asset-their data.

Click here.

rule

Spotlight Story
Security disaster averted by financial firm's quick actions

While most of the IT world has been spared a devasting security attack like Blaster and Sasser for the last few years, the damage wrought by all manner lesser-known computer viruses continues to inflict corporate pain. Read full story

Related News:

802.1n Proves Standards Aren't What They Used To Be
802.11n is the poster child for a standards process gone wrong. Seven years after it began and at least two years after 802.11 "draft" devices arrived, the IEEE has finally adopted a final standard for faster, stronger, more secure wireless.

NSS Labs to do more security-product testing without vendor funding
For several years NSS Labs has mainly done vendor-sponsored testing of security products in its Austin, Texas evaluation lab, but the firm is now shifting its focus to do many more independent self-funded projects for test reports that will be labeled as such.

Access control vendors unite to tackle Linux, Unix and Windows
Symark International Monday is announcing the acquisition of BeyondTrust for approximately $20 million in a deal that brings together two privately-held access control product vendors. Under the deal, Symark is adopting the BeyondTrust name.

Slideshow: Products of the week
Our round-up of intriguing new products from Palm, Motorola, IBM among others.

Meet Google's 'Data Liberation Front'
You say you want a revolution? Google's hoping you do -- at least, when it comes to being able to take your cloud-stored data wherever you want.

New Facebook Scam Targets 'Fan Check' Application
New twist on old social engineering tactic as hackers lure Facebook users to malware-infected sites -- all in the name of security.

Companies patch OS holes, but biggest priority should be apps
Corporations appear to be much slower in patching their applications than their operating systems, even though attackers are mainly targeting application vulnerabilities, according to a new report based on data from TippingPoint, Qualys and the SANS Institute.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

Virtualization Strategy for Mid-Sized Businesses
As data mounts, small and midsize businesses cope with a sprawling and often costly infrastructure. This paper shows how these businesses can benefit by implementing a virtualization strategy. A well-executed strategy can result in fewer, better-utilized servers, rapid provisioning of servers, affordable business continuity, and more streamlined, efficient management.
Learn More


EMA: Successfully Managing your Next-Gen Data Center
How well are your virtual servers performing? Get them in tip-top shape with the best practices shared in this Live Webcast on Thursday, October 15, 2009 at 2 PM EST/11 AM PT. Join Jim Frey of Enterprise Management Associates as he discusses how to identify root cause issues, quickly spot performance bottlenecks, improve IT service delivery and much more.
Register today.

 

September 18, 2009

MOST-READ STORIES

  1. 10G Ethernet shakes net design to the core
  2. First look: Google Chrome 3.0
  3. Tech's worst year ever?
  4. T-Mobile backs off plan to charge $1.50 for paper bill
  5. Cubicles gone wild: 13 wacky workspaces
  6. HP extends data center, campus Ethernet switches
  7. Android 1.6 SDK arrives as Google platform gains traction
  8. Security disaster averted by financial firm's quick actions
  9. Apple betrays the iPhone's business hopes
  10. Send large files via Yahoo Mail

Gartner Predicts 2009: Recession Accelerated Shifts in IT Services
Recessions have the powerful effect of accelerating shifts in the market. The need to lower cost, increase efficiency and conserve cash has increased the motivation of companies to turn to outsourcing and increased the appeal of alternative delivery models. The disruptive shifts in new demand and supply patterns will drive changes for how IT services are bought and from whom. Gartner's Strategic Planning Assumptions for the IT services market will help buyers and sellers plan their strategies.
Learn more, click here.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment