Search This Blog

Friday, October 16, 2009

NASA network security torched

Why Security Matters Now; Global State of Information Security Survey Methodology
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by 3COM
rule

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.

Learn more

rule

Spotlight Story
NASA network security torched

While NASA may be focused on keeping its manned space flight plans intact, apparently it has seriously neglected the security of its networks. Watchdogs at the Government Accountability Office issued a 53-page report pretty much ripping the space agency's network security strategy stating that NASA has significant problems protecting the confidentiality, integrity, and availability of the information and variety of networks supporting its mission centers Read full story

Related News:

Why Security Matters Now
Today's most compelling technologies are giving you the biggest security headaches. Social networking sites such as Twitter, Facebook and LinkedIn enhance collaboration and help your company connect with customers, but they also make it easier than ever for your employees to share customer data and company secrets with outsiders.

Global State of Information Security Survey Methodology
How we got the numbers.

12-million-digit prime number sets record, nets $100,000 prize
A 12 million digit prime number, the largest such number ever discovered, has landed a voluntary math research group a $100,000 prize from the Electronic Frontier Foundation (EFF). The number known as a Mersenne prime, is the 45th known Mersenne prime, written shorthand as 2 to the power of 43,112,609, minus 1 . A Mersenne number is a positive integer that is one less than a power of two, the group...

Study backs open access to broadband networks
Almost all of the most successful countries in broadband deployment have opened up the networks of their main carriers to competing service providers, according to a draft report put out for comment on Wednesday by the U.S. Federal Communications Commission.

How data security can vaporize in the cloud
While cloud computing services offer a way to lower costs and offload basic server and storage maintenance to companies that purport to have expertise, it also presents dramatic security and legal challenges that should be considered before signing up.

L.A. critics of Google cloud services need a little perspective
A consumer group protesting the use of Google cloud services by the City of Los Angeles says the company is speaking out of both sides of its mouth about security, but the complaint may be overblown.

Five Problems Keeping Legacy Apps Out of the Cloud
Did you think all those legacy apps would just float up into someone else's cloud infrastructure? Management, licensing and migration concerns highlight the list of troubles that vendors are now trying to address.

U.S. Dept. of Education ties desktop encryption to employee ID cards
The Department of Education's desktop encryption rollout links the cryptographic process to employees' government-issued smart cards.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

VMware Data Backup and Recovery Best Practices
VMware offers extraordinary benefits, but it can come at the cost of extra storage, backup resources and administrative challenges. Data Domain deduplication storage offers a way out by reducing redundant data across VMware data backups, operating at disk speeds, and providing cost-effective replication for fast DR using backup images.
Click here to learn more.


Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More

 

October 16, 2009

MOST-READ STORIES

  1. 12 words you can never say in the office
  2. Missing dot drops Sweden off the Internet
  3. 10 great Google Apps add-ons for the enterprise
  4. Delta Air Lines sued over alleged e-mail hacking
  5. Facebook applications at risk from attack
  6. Cisco backpedals on WiMAX with Starent buy
  7. The Internet has shifted under our feet
  8. 'Spider guy' fesses up to McDonald's drive-through hoax
  9. What cloud computing project would you build with $32 million?
  10. The world's most extreme laptops

Webcast: When Good Applications Go Bad
Register today to hear Andrew Jaquith, Senior Analyst at Forrester Research, and Anthony James, VP Products at Fortinet, discuss the challenges posed to enterprises by application security threats. Additionally, hear a customer testimonial on how CKE Restaurants, responsible for operating many of the USA's most popular quick-service and fast-casual dining restaurants, reduced the risk of application-borne threats.
Register now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: