Search This Blog

Friday, November 13, 2009

Six Steps to Pull App Security Back to the Future; SAS chief hot on fraud detection, cool on cloud computing

SAS chief: Hot on fraud detection, cool on cloud computing; Best BlackBerry apps of 2009
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Netcordia
rule

The Importance of PCI DSS Compliance
The greatest challenge to PCI DSS compliance resides in monitoring and managing all its specific network requirements, which encompass security firewalls, access and change controls, system updates, configuration changes and testing procedures. Learn how to ensure that your organization achieves and maintains compliance.

Learn more

rule

Spotlight Story
Six Steps to Pull App Security Back to the Future

OWASP will host its 2009 AppSec DC conference next week, hoping to arm IT security practitioners with knowledge to improve application security. For a taste of what to expect, organization member Matt Fisher discusses what's wrong with app security today and six ways to make it better. Read full story

Related News:

SAS chief: Hot on fraud detection, cool on cloud computing
At a recent media event, SAS CEO Dr. Jim Goodnight spoke with IDG Enterprise Chief Content Officer John Gallant about how businesses did -- and didn't -- take advantage of BI during the downturn and how the economy has changed the playing field in the BI market.

Best BlackBerry apps of 2009
Rounding up the 16 finalists in the BlackBerry Developer Challenge

eEye scans for vulnerabilities, compliance problems
A new compliance and security management tool from eEye Digital Security can help ensure endpoint computers satisfy regulatory requirements.

Postini technology to spread across Google Apps
The Postini technology that lets Google Apps Premier administrators control their e-mail environments by establishing and enforcing usage policies, rules and parameters will be extended to the other applications of the suite.

What's next for Wi-Fi?
The approval of the 802.11n wireless standard marks not the end but the start of a wave of Wi-Fi innovation. Here are eight ways it will change in the next three to five years.

Steganography meets VoIP in hacker world
Researchers and hackers are developing tools to execute a new data-leak threat: sneaking proprietary information out of networks by hiding it within VoIP traffic.

Guarding against database anti-forensics
Database hacking has gone mainstream and is becoming harder to detect because of the increasingly sophisticated anti-forensic procedures hackers use to cover their tracks.

H1N1 drives demand for secure remote access
Vendors of remote access technologies are reporting an unexpected increase in demand for their products over the past several months as a result of companies' H1N1-related concerns.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.


SLA Compliance: Wireless Fidelity Achieved
Aerohive delivers the next level in network visibility and reactive response with a new infrastructure-side performance monitoring and response system: SLA Compliance. By increasing the troubleshooting granularity and active response speed far beyond what any IT professional could accomplish manually, SLA Compliance allows IT to make Wi-Fi performance guarantees.
Learn more!

 

November 13, 2009

MOST-READ STORIES

  1. HP buying 3Com in $2.7 billion blockbuster
  2. 3Com co-founder Metcalfe's quick take on HP-3Com buyout
  3. Priceless! The 25 funniest vintage tech ads
  4. 3Com: one of the longest running shows in networking
  5. 3Com saved by HP - and Cisco
  6. Inside the posh pads of tech's elite
  7. IA job prospects bright
  8. Rotten Apple: Apple's 12 biggest failures
  9. Verbal and visual mashup of HP's reasons for buying 3Com
  10. Security pros seek hacking, forensics skills

Improving Application Performance Troubleshooting
Dramatically reduce downtime with the right tools. This whitepaper explains the four key features your application performance management toolset should include. Look for automation, intuitive analysis, real-time support and proactive problem solving.
Read More



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: