Search This Blog

Monday, October 26, 2009

Three simple rules of risk management

Windows 7 And You: Wait For The Service Pack?; NIST SP800-53 Rev. 3: Key to Unified Security Across Federal Government and Private Sectors
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Trend Micro
rule

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.

Read More

rule

Spotlight Story
Three simple rules of risk management

Chris Sullivan, Corion's vice president of customer solutions, recently posted a blog entry about risk management. In it he quotes Warren Buffett, the world's richest man and undisputed king of practical risk management who once said, "Risk comes from not knowing what you're doing." Read full story

Related News:

Windows 7 And You: Wait For The Service Pack?
For many, the official release of a new Microsoft operating system--such as Windows 7--is just the starting of a clock. They will not buy the new OS until Service Pack 1 is released.

NIST SP800-53 Rev. 3: Key to Unified Security Across Federal Government and Private Sectors
Standards play a critical role in information assurance. Given the impossibility of defining a deterministic model that includes billions of users, millions of computers, and thousands of programs and protocols potentially interacting with each other unpredictably, we have to rely on human consensus about best practices if we are to progress in our field. Standards also provide a basis for demonstrating due care and diligence in fulfilling our fiduciary responsibilities to stakeholders.

Week in Security: Windows 7 a go; Steve Ballmer a pro; ChoicePoint, MoneyGram face woe
A look back at all things security for the past week:

Trend Micro bolsters virtualization security options
Trend Micro's Deep Security firewall/intrusion-protection system software for VMware's ESX server can protect multiple virtual machines on one physical server.

Report says China ready for cyber-war, espionage
Looking to gain the upper hand in any future cyber conflicts, China is probably spying on U.S. companies and government, according to a report commissioned by a Congressional advisory panel monitoring the security implications of trade with China.

Cisco Releases IPSEC & SSLVPN Client for Windows 7 and Snow Leopard
Cisco just released support for the Windows 7 operating system in both its IPSEC client and SSLVPN client software. The Cisco Anyconnect 2.4 SSLVPN client now supports both 32bit and 64bit Windows 7 hosts. The new Anyconnect 2.4 client additionally supports MAC OSX 10.6.1 32 and 64bit operating systems as well. Cisco also released a Windows 7 32bit version of its widely deployed Cisco VPN client...

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Rapid Replication for Virtual Servers
What's the connection between virtualization and acceleration? It's deeper than you might think. See how these two hot technologies complement each other to consolidate servers, enhance DR and simplify the IT infrastructure.
Learn more.


Laptop Security Redefined
A laptop for "the whole team," that's what Lenovo created with the new ThinkPad T400. It takes thin and light to a new level, but even more compelling; it creates a new standard for laptop security. Lenovo provides manageability to remotely manage PCs for the diagnosis, isolation and healing of threats even when the PC is powered down. There's also a "poison pill" to deactivate a stolen notebook even if it's off the network.
Learn more.

 

October 26, 2009

MOST-READ STORIES

  1. McCain introduces bill to block FCC's net neutrality rules
  2. FAQ: What's the FCC vote on net neutrality all about?
  3. Goodbye steering wheel, here comes drive-by-joystick
  4. Torvalds offers a thumbs up to Windows 7
  5. Security hole turned 64,000 Time Warner cable modems into hacker prey
  6. Smartphones for the holidays
  7. AT&T weighs higher fees for data hogs
  8. 10 people you won't see at Microsoft's Windows 7 launch party
  9. Gartner on cloud security: "Our nightmare scenario is here now"
  10. Microsoft, Dell, Spectrum Bridge launch first public white spaces network

Why SOA-based Date Services?
Data. It's your organization's most proprietary asset. Whether it's in traditional IT systems or in the internet cloud, the ability to get to it, trust it, and use it to drive effective actions is your competitive advantage.
Register for the launch of Informatica 9 today.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: