Search This Blog

Friday, October 09, 2009

The Seven Deadly Sins of Security Policy; How to stop IT managers from going rogue

How to stop IT managers from going rogue; Slideshow: Commercial web browser turns 15
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Shunra
rule

Best Practices for Selecting WAN Optimization Solutions
This white paper explains how to best make this critical technology decision. It provides an overview of best practices for defining requirements and comparing alternative solutions. Most important, it offers a metric – performance ROI – that IT organizations can use to select the WAN optimization solution that delivers the greatest business value.

Learn More

rule

Spotlight Story
The Seven Deadly Sins of Security Policy

Are your security policies really managing your organization's risks? Or are they just 'check-the-box' rules? We detail common policy mistakes security pros often make. Read full story

Related News:

How to stop IT managers from going rogue
Nearly half of all data breaches come from inside an organization, which is why industry watchers say enterprise IT departments need to invest in technology that ensures no one person has all the power.

Slideshow: Commercial web browser turns 15
he Web browser turns 15 on Oct. 13, 2009 – a key milestone in the history of the Internet. That's when the first commercial Web browser — eventually called Netscape Navigator — was released as beta code. While researchers including World Wide Web inventor Tim Berners-Lee and a team at the National Center for Supercomputing Applications created Unix browsers between 1991 and 1994, Netscape Navigator made this small piece of desktop software a household name. By allowing average users to view text and images posted on Web sites, Netscape Navigator helped launch the Internet era along with multiple browser wars, government-led lawsuits and many software innovations. Here are 15 highlights in the history of the Web browser

PayChoice offers more details about data breach
PayChoice, which this week confirmed that its online payroll systems operations were breached on Sept. 23, is now beginning to offer details on what it thinks may have happened.

Microsoft ships RC1 of new Forefront Identity Manager
Microsoft ships identity infrastructure software that will figure prominently in its plan to integrate security and identity technologies to protect clients, servers and the network edge.

Cisco extends security controls to 'dark Web'
Cisco is tackling the 'dark Web' of online content that's not easily indexed with new usage controls for its IronPort S-Series Web Security Appliances.

Compromised Hotmail, Yahoo, Gmail accounts exploited in fake shopping scam
In the wake of the posting in online forums of stolen account and password information for thousands of Hotmail, Gmail and Yahoo e-mail accounts, there's evidence of yet more abuse that entails attackers exploiting that information to hack into compromised accounts over the last few days to send spam aimed at stealing credit cards.

Be cautious - be very, very cautious
In our last newsletter we discussed how our research into cloud computing had sensitized us to the overwhelming concern that IT organizations have for the security and privacy of their data. We also began to analyze how the US government has been gaining increasing power to access data that once appeared to be private. In this newsletter, we will continue that analysis and will also discuss what this means for IT organizations.

CIA endorses cloud computing, but only internally
One of the U.S. government's strongest advocates of cloud computing is also one of its most secretive operations: the CIA. The agency has adopted cloud computing in a big way, and it believes that the cloud approach makes IT environments more flexible and secure.

Report: Dozens indicted in widespread phishing scheme
The L.A. Times reported that more than 50 people will be indicted today on charges related to a phishing scheme that led to the theft of bank acount information from thousands of people in the U.S.

Bitbucket's downtime is a cautionary cloud tale
Bitbucket's weekend troubles with Amazon's cloud services are instructive, but don't necessarily indicate a problem with cloud security.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Storage Survey - Chance to win $500!
Are you involved with storage for your organization? Could you use an extra $500 cash? Come share your storage knowledge with us and enter a drawing for a chance to win $500 cash!
Click here to participate!


 

October 09, 2009

MOST-READ STORIES

  1. 7 keys to the ultimate smartphone
  2. Compromised e-maill accounts exploited in fake shopping scam
  3. Harvard's robotic bees generate high-tech buzz
  4. First look at new Windows Mobile 6.5 phones
  5. 15 genius algorithms that aren't boring
  6. 500 words too taxing? Does the 'T' in MIT stand for Tweet?
  7. 10 seriously ridiculous hacks
  8. Gmail, Yahoo Mail join Hotmail; passwords exposed
  9. Laptop theft gives 850,000 doctors the blues
  10. Pentagon: Our cloud is better than Google's

NetScaler VPX: Harness the Power of Virtualized Web App Delivery
Technical Whitepaper – "NetScaler VPX: Harness the Power of Virtualized Web App Delivery" – shows you how the NetScaler VPX virtual appliance offers maximum physical, functional, and operational flexibility for delivering web apps. Learn how virtual application delivery controllers can unleash the power of a virtualized dynamic data center! Compliments of Citrix.
Read Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: