Monday, October 05, 2009

ICANN studies secretive domain owners

National Cybersecurity Awareness Month Must Become More than a PR Event; Microsoft ships RC1 of new Forefront Identity Manager
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by VMWare
rule

Five Steps to Determine When to Virtualize Your Servers
Server virtualization isn't just for big companies. Entry-level virtualization tools are low cost, and there are many benefits to virtualization. It's not a question of "if" you should virtualize your servers - but "when." This white paper outlines five solution-agnostic steps to help you determine when to virtualize your servers.

Learn more now.

rule

Spotlight Story
ICANN studies secretive domain owners

Approximately 15 percent to 25 percent of domain names have been registered in a manner that limits the amount of personal information available to the public through WHOIS queries, according to the preliminary results of a report from ICANN (Internet Corporation for Assigned Names and Numbers). Read full story

Related News:

National Cybersecurity Awareness Month Must Become More than a PR Event
Yesterday, I attended an industry event in Washington to kickoff October as National Cybersecurity Awareness Month. The event was sponsored by the National Cybersecurity Alliance and featured prominent speakers including Department of Homeland Security Secretary Janet Napolitano, Deputy Defense Secretary William Lynn, and the White House National Security Staff's Acting Senior Director for Cybersecurity,...

Microsoft ships RC1 of new Forefront Identity Manager
Microsoft ships identity infrastructure software that will figure prominently in its plan to integrate security and identity technologies to protect clients, servers and the network edge.

Report: Lack of eHealth standards, privacy concerns costing lives
A new survey of medical executives by PriceWaterhouseCoopers finds the mining of electronic health record information will be the greatest asset to medical facilities over the next five years, but that privacy concerns and a lack of technology is hampering efforts and costing lives.

Microsoft defends its anti-malware software after Symantec piles on
Microsoft is defending the merits of its free Security Essentials anti-malware software after a top Symantec engineer badmouthed the new release.

Security researchers ask: Does self-destructing data really vanish?
Researchers this week published a paper describing how they broke Vanish, a secure communications system prototype out of the University of Washington that generated lots of buzz when introduced over the summer for its ability to make data self-destruct.

U.S. Homeland Security wants to hire 1,000 cybersecurity experts
The Department of Homeland Security is looking to hire 1,000 cybersecurity professionals in the next three years according to the agency's secretary Janet Napolitano.

BlackBerry Update Fixes Phishing Flaw
Research In Motion yesterday announced a new BlackBerry patch that fixes a display flaw that could help phishers conduct an attack.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

IDC: Optimizing Storage to Reduce Data Footprint and Lower Costs
Read this review on today's storage optimization and technologies. Learn how they reduce the data footprint and identify how various technologies work toward this goal.
Learn more


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

October 05, 2009

MOST-READ STORIES

  1. Ig Nobels honor Tequila diamonds, bra that converts to gas mask
  2. Cisco's struggle to move TelePresence down market prompts buyout
  3. FBI warns of social networking fraud, malware escalation
  4. Cisco to buy videoconferencing vendor Tandberg for $3B
  5. U.S. Homeland Security wants to hire 1,000 cybersecurity experts
  6. Microsoft defends its antimalware software after Symantec piles on
  7. The dark side of DLP
  8. Microsoft turning configuration management "on its side"
  9. Facebook CAPTCHA no match for spyware attack
  10. Obama bars fed workers from texting and driving

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment