NASA network security torched While NASA may be focused on keeping its manned space flight plans intact, apparently it has seriously neglected the security of its networks. Watchdogs at the Government Accountability Office issued a 53-page report pretty much ripping the space agency's network security strategy stating that NASA has significant problems protecting the confidentiality, integrity, and availability of the information and variety of networks supporting its mission centers. Overlooked VOIP Security Features I am wanker when it comes to VOIP. I am not a huge VOIP fan. Nope. Not much at all. When I was growing up, phracking never really appealed to me. I remember tripping my first 5ESS and not thinking "that's cool" but "so what". Kinda weird because VOIP possesses all the elements I like in engineering design. It has many parts, separate protocols, programming elements, high end user satisfaction, massive... Ford tech trade secrets stolen by China? Despite the fact that the auto industry is going through some extremely tough times apparently doesn't make foreign countries covet its technology any less. Ethernet everywhere! Inside planes, trains, cars and spaceships, Ethernet is a morph master Online libel case stirs up free speech debate An Illinois politician's attempt to unmask the identity of an e-mail poster who allegedly made disparaging remarks about her teenage son in an online forum is stirring a debate about free speech rights on the Internet. How to protect a database from the inside out Your databases contain your company's most sensitive information -- credit card numbers, bank records, customer account information, financial records and so on. Chances are your database security is based on building a secure perimeter around the database, but this still leaves the data at risk. Sentrigo puts a sensor on your database to detect each illicit activity so you can detect, alert and prevent data breaches. This sensor helps protect databases from the inside out. Sneaky Microsoft plug-in puts Firefox users at risk An add-on that Microsoft silently slipped into Mozilla's Firefox last February leaves that browser open to attack, Microsoft's security engineers acknowledged earlier this week. Windows 7 Migration: Four Planning Tips As you plan for your enterprise Windows 7 deployment, you can also clean house and improve efficiency. Here's a look at four key areas to consider. Five Problems Keeping Legacy Apps Out of the Cloud Did you think all those legacy apps would just float up into someone else's cloud infrastructure? Management, licensing and migration concerns highlight the list of troubles that vendors are now trying to address. Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Network World on Twitter? You bet we are |
No comments:
Post a Comment