Search This Blog

Monday, October 19, 2009

Overlooked VOIP Security Features

In six years of Patch Tuesdays, 400 security bulletins, 745 vulnerabilities; Ford tech trade secrets stolen by China?
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Alcatel-Lucent
rule

Protect your investment with comprehensive NAC
As CTO or IT administrator, the vulnerability of your enterprise LAN keeps you awake, one infected system can quickly infect your entire network. Is it possible to secure your business without getting in the way of productivity? With the Alcatel-Lucent NAC solution, you can ensure 100% of network end points are compliant, read more

Click to continue

rule

Spotlight Story
Overlooked VOIP Security Features

I am wanker when it comes to VOIP. I am not a huge VOIP fan. Nope. Not much at all. When I was growing up, phracking never really appealed to me. I remember tripping my first 5ESS and not thinking "that's cool" but "so what". Kinda weird because VOIP possesses all the elements I like in engineering design. It has many parts, separate protocols, programming elements, high end user satisfaction, massive... Read full story

Related News:

In six years of Patch Tuesdays, 400 security bulletins, 745 vulnerabilities
Microsoft's massive security update for October marked the completion of the sixth year of the company's move to a monthly patch release schedule.

Ford tech trade secrets stolen by China?
Despite the fact that the auto industry is going through some extremely tough times apparently doesn't make foreign countries covet its technology any less.

Online libel case stirs up free speech debate
An Illinois politician's attempt to unmask the identity of an e-mail poster who allegedly made disparaging remarks about her teenage son in an online forum is stirring a debate about free speech rights on the Internet.

How to protect a database from the inside out
Your databases contain your company's most sensitive information -- credit card numbers, bank records, customer account information, financial records and so on. Chances are your database security is based on building a secure perimeter around the database, but this still leaves the data at risk. Sentrigo puts a sensor on your database to detect each illicit activity so you can detect, alert and prevent data breaches. This sensor helps protect databases from the inside out.

Sneaky Microsoft plug-in puts Firefox users at risk
An add-on that Microsoft silently slipped into Mozilla's Firefox last February leaves that browser open to attack, Microsoft's security engineers acknowledged earlier this week.

How to royally foul-up an IT outsourcing project
Outsourcing Virginia's IT operations to Northrop Grumman was supposed to put the state's network beyond politics, overhaul and standardize it and improve operations, but the effort has failed in almost every respect.

A Rogue Demands A Ransom
Rogue antivirus pushers have made big bucks by tricking people into paying for worthless software, but the ever-greedy scammers have added a new evil trick.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

5-Steps For Lowering Mobile Employee TCO
The rise of employee-owned BlackBerry, iPhone and other smartphones has created significant IT management and compliance challenges. This report recommends a 5-Step Mobility Management approach used by IT execs at best-in-class companies to cut mobility TCO, reduce risk and increase productivity.
Learn more.


Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More.

 

October 19, 2009

MOST-READ STORIES

  1. How to royally foul-up an IT outsourcing project
  2. Husband, wife team arrested for allegedly stealing from Cisco
  3. Missing dot drops Sweden off the Internet
  4. 15 genius algorithms that aren't boring
  5. NASA network security torched
  6. The Internet has shifted under our feet
  7. 10 great Google Apps add-ons for the enterprise
  8. He knows .Net and SQL ... not missile launchers
  9. Microsoft apologizes, recovers most Sidekick data
  10. Facebook applications at risk from attack

802.11n Drives an Architectural Evolution
The sharp capacity increase possible with 802.11n is a compelling force behind the evolution in WLAN architectures. This paper examines both the centralized WLAN switch architecture and the optimized WLAN architecture, so that the wireless network choice an organization makes today will protect its investment and allow it to experience the substantial benefits of 802.11 for years to come.
Learn more



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: