Thursday, October 08, 2009

The Seven Deadly Sins of Security Policy

Malware flea market pays hackers to hijack PCs; Harvard's robotic bees generate high-tech buzz
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Network World Research
rule

Storage Survey - Chance to win $500!
Are you involved with storage for your organization? Could you use an extra $500 cash? Come share your storage knowledge with us and enter a drawing for a chance to win $500 cash!

Click here to participate!

rule

Spotlight Story
The Seven Deadly Sins of Security Policy

Are your security policies really managing your organization's risks? Or are they just 'check-the-box' rules? We detail common policy mistakes security pros often make. Read full story

Related News:

Malware flea market pays hackers to hijack PCs
Hackers are paid $140 for installing malware on 1,000 U.S computers. But Russia and former Soviet Bloc countries appear to be off limits.

Harvard's robotic bees generate high-tech buzz
Harvard researchers recently got a $10 million grant to create a colony of flying robotic bees, or RoboBees to among other things, spur innovation in ultra-low-power computing and electronic "smart" sensors; and refine coordination algorithms to manage multiple, independent machines.

Are you Vulnerable?
Is your network Vulnerable? If you are running 4.x and 5.x WLC software you may be. Ask yourself, "Did I follow Cisco Best Practices?" If you didn't you may be sorry. A recent issue with OTAP has been widely discussed in online forums, blogs, and such. You may be familiar, but, If you don't understand OTAP (Over the Air Provisioning) visit the following site to get you up to speed:

Be cautious - be very, very cautious
In our last newsletter we discussed how our research into cloud computing had sensitized us to the overwhelming concern that IT organizations have for the security and privacy of their data. We also began to analyze how the US government has been gaining increasing power to access data that once appeared to be private. In this newsletter, we will continue that analysis and will also discuss what this means for IT organizations.

CIA endorses cloud computing, but only internally
One of the U.S. government's strongest advocates of cloud computing is also one of its most secretive operations: the CIA. The agency has adopted cloud computing in a big way, and it believes that the cloud approach makes IT environments more flexible and secure.

Princeton's Wayback Machine helps break Vanish security system for self-destructing data
Researchers this week published a paper describing how they broke Vanish, a secure communications system prototype out of the University of Washington that generated lots of buzz when introduced over the summer for its ability to make data self-destruct.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.
Learn more


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

October 08, 2009

MOST-READ STORIES

  1. 500 words too taxing? Does the 'T' in MIT stand for Tweet?
  2. Microsoft's mobile turnaround: what's at stake
  3. Malware flea market pays hackers to hijack PCs
  4. 10 seriously ridiculous hacks
  5. Pentagon: Our cloud is better than Google's
  6. For sale: Cisco data center rival Brocade
  7. Gmail, Yahoo Mail join Hotmail; passwords exposed
  8. Cisco releases IOS 15.0
  9. Is the worst of recession over for IT pros?
  10. Review: HP blade takes a stab at Cisco

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment