Monday, October 12, 2009

Engineers fix the shortcomings of the traditional firewall

Analysis: Phishing arrests highlight massive problem; BlueCross lucky to be in U.S. rather than Japan
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Palisade Systems Inc.
rule

In less than 45 minutes, we protect your data.
Palisade Systems is a leader in data loss prevention with the only appliance that installs and protects sensitive data in less than 45 minutes. Our content analysis technology can discover, monitor and secure structured and unstructured confidential data.

Click to continue

rule

Spotlight Story
Engineers fix the shortcomings of the traditional firewall

Do you find yourself putting a Band-Aid solution on a legacy firewall, such as strapping on an intrusion-prevention system here or antivirus software there? If the firewall is a security device, why should we have to surround it with other security devices to help it do its job? A group of security engineers addressed those shortcomings with a new kind of firewall built from the ground up. Read full story

Related News:

Analysis: Phishing arrests highlight massive problem
The massive phishing scam broken up by federal authorities this week is only a hint at what many say is an insidious and growing problem on the Internet.

BlueCross lucky to be in U.S. rather than Japan
Interesting response from a reader to Wednesday's post about BlueCross BlueShield losing custody of personal information for 850,000 doctors as a result of a laptop theft: This company is lucky that they are not in Japan. The penalty for data loss here is extremely high. Basically, it can bankrupt a company. "In Japan, companies pay for security breaches in the form of an 'apology fine', sometimes...

Spam accounts for 86% of all emails
Worldwide spam has surged by nine times and now makes up 86 percent of all emails, says Symantec.

Kaspersky intros Kaspersky Anti-Virus for Mac
Kaspersky Lab has introduced Kaspersky Anti-Virus for Mac, which the company believes strengthens the security provided by Apple and offers a platform to add additional security modules as new threats emerge.

Hackers exploit year's fourth PDF zero-day
Adobe has acknowledged that hackers are exploiting bugs in its Reader PDF viewer and Acrobat PDF maker to break into Wndows-based PCs.

Google patches DoS vulnerabilities in Android
Researchers at the Open Source Computer Emergency Response Team disclosed two denial-of-service vulnerabilities in Google's Android 1.5 mobile phone platform, both of which have already been patched by the vendor.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More


Storage Survey - Chance to win $500!
Are you involved with storage for your organization? Could you use an extra $500 cash? Come share your storage knowledge with us and enter a drawing for a chance to win $500 cash!
Click here to participate!

 

October 12, 2009

MOST-READ STORIES

  1. One by one, carriers succumb to Google Voice
  2. Compromised e-maill accounts exploited in fake shopping scam
  3. How dangerous could a hacked robot possibly be?
  4. Six everyday iPhone disasters and how to handle them
  5. Ex-Nortel CEO seeks $12 million from bankrupt company
  6. First Windows 8 details emerge
  7. 7 keys to the ultimate smartphone
  8. Harvard's robotic bees generate high-tech buzz
  9. Cisco extends security controls to 'dark Web'
  10. 15 genius algorithms that aren't boring

Reduce Your Private WAN Bill 40-90% With Adaptive Private Networking
Steven Taylor moderates a discussion on a breakthrough new technology that offers the best of all worlds. Discover Adaptive Private Networking from Talari Networks. Learn how APN enables you to: Deliver more bandwidth per dollar than MPLS services at the same time providing greater reliability and application predictability.
View Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment