Monday, November 09, 2009

The importance of context

Cisco MARS shuts out new third-party security devices; You don't know tech: The InfoWorld news quiz
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by 3COM
rule

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.

Learn more

rule

Spotlight Story
The importance of context

Context is important. I know I say that a lot, but I'll keep saying it until you all agree. That is to say, you're entitled to your own opinion but if your opinion is that context isn't important then your opinion is just wrong. To clarify for those of you new to this argument, context refers to the who, what, when, where, why and how of a transaction, in particular an identity-based transaction. Knowing those things greatly reduces the chances of fraud, mitigating the risk involved in the transaction. Read full story

Related News:

Cisco MARS shuts out new third-party security devices
Cisco has finally publicly acknowledged it won't add support for new third-party devices to its security information and event monitoring appliance, ending months of speculation about the future of its Monitoring, Analysis and Response System. Some claim it's the beginning of the end for MARS as a multi-vendor SIEM device.

You don't know tech: The InfoWorld news quiz
Intel earns New York's ire, Chinese iPhones don't inspire

Switchers Guide: Understanding Mac security
When it comes to security, using Windows can feel like living in the heart of a big city--the kind of place where you can install all the locks and alarms you want, but you still worry. The vast number of computer users who run Microsoft operating systems form the biggest, juiciest target cybercriminals could dream of. Which is why there are more than twenty-two million unique examples of Windows malware out there.

Spoof Apple Trojan upsets Symantec
Symantec has discovered a file-deleting 'Trojan' targeting Mac users. But is it really a piece of malware or a valid but hazardous example of online art?

Survey: Security Certifications Hot Among IT Pros
CompTIA finds IT pros value and seek new security-related certifications above all other areas.

SSL Hole Cracks Open Secured Web Traffic
A critical new flaw in SSL, or the Secure Sockets Layer used to protect Web traffic for online banking, shopping, and any other https connection, allows an attacker to break into any theoretically secured connection and add malicious commands.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Why the Branch Office No Longer Needs IT
Is your business ready for managed services? Can you mitigate the potential risk and loss of data for access to business information and applications? What services should you consider outsourcing to a managed services provider and what can you do to mitigate the potential for loss? This webcast will address the current state of the market for branch office focused managed services and provide insights and considerations into managed services that you should be considering.
Click here to learn more.


When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.

 

November 09, 2009

MOST-READ STORIES

  1. 10 stunning 3D buildings made with Google SketchUp
  2. Vendors scrambling to fix bug in 'Net's security
  3. Microsoft Linux: Why one free software advocate wants it
  4. Verizon confirms Droid tethering option, hefty price tag
  5. Rackspace apologizes for cloud outage
  6. Inside the Atari 800
  7. Volpi bragged he could get Cisco's top stars to jump ship
  8. Judge dismisses lawsuit challenging Gartner's Magic Quadrant
  9. Is the Cisco MARS mission going to abort?
  10. Cisco shutters Cerent HQ in Petaluma, Calif.

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment