Thursday, November 05, 2009

SP 800-53 is essential for security in federal government IT systems

New software detects bots scraping Web site data; FCC and DOT team-up, want high-tech cure for distracted driving
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Websense
rule

The Executive Guide to Data Loss Prevention
Independent, objective research that examines the business justification for implementing DLP solutions and outlines the resource requirements to successfully deploy DLP in an enterprise. Data loss prevention (DLP) technology has never been more important. To that end, we've developed tools to help guide organizations considering DLP technologies.

Read more.

rule

Spotlight Story
SP 800-53 is essential for security in federal government IT systems

SP 800-53 (Appendix H) provides two-way mappings between security controls defined in SP 800-53 and security controls defined in international security standard ISO/IEC 27001, Information Security Management Systems Read full story

Related News:

New software detects bots scraping Web site data
Web sites such as job boards face a persistent problem: their data is constantly pilfered by automated bots.

FCC and DOT team-up, want high-tech cure for distracted driving
The Federal Communications Commission and the US Department of Transportation are teaming up to develop what they called high-tech solutions to the growing problem of distracted or inattentive drivers.

Cisco computer game lets you play CEO
If you want to be a CEO but not have any of the real responsibilities of one, you could try to play a new online game being offered by Cisco. The company this week posted myPlanNet, a computer game that lets anyone be a broadband executive making network deployment decisions.

Put cybersecurity chief in DHS not the White House, Senator says
Five months after President Obama announced the need for a White House-appointed coordinator to oversee national cybersecurity affairs, the debate continues in Washington over whether such a coordinator would be more effective if outside the White House.

InfoWorld review: Whitelisting security comes of age
Remarkably good solutions from Bit9, CoreTrace, Lumension, McAfee, and SignaCert show that whitelisting may be the new best defense against modern malware

Microsoft 'neutered' UAC in Windows 7, says researcher
A Sophos security official said that Microsoft went too far in cutting the security messages delivered in Windows 7 by "neutering" the User Account Control (UAC) feature.

BlackBerry Desktop Manager Update Fixes Security Flaw
BlackBerry smartphone users with Research In Motion's (RIM) BlackBerry Desktop Manager software installed on Windows PCs--or Mac-based Windows virtual machines--should update the Desktop Manager software immediately, according to RIM.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Why Small Companies Should Think Outside Box for Protecting Endpoints
In their "Sector Insight" study, Aberdeen Group investigated the considerations small business should take when selecting anti-malware solutions. Read this paper to learn why Aberdeen recommends small enterprises be open to endpoint security solutions from vendors other than McAfee and Symantec.
Read Now


The Importance of Measuring Power in Your Data Center
Historically, IT managers worried little about power consumption. This has quickly changed due to limits in power availability, the cost of power and companies' green initiatives. This white paper explores why and where power should be measured, what to do once data is gathered, and emerging new technologies.
Read More.

 

November 05, 2009

MOST-READ STORIES

  1. How a start-up failed to take supercomputing world by storm
  2. AT&T sues Verizon over TV ads
  3. Tone-deaf Unisys official on why cloud computing rocks
  4. Microsoft sets SQL Server 2008 R2 preview
  5. T-Mobile suffers another outage
  6. FBI warns of $100M cyber-threat to small business
  7. The Cisco squeeze
  8. Cisco, EMC unveil data center joint venture
  9. IBM executive accused of insider trading out of a job
  10. Why can't we do anything about spam?

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment