Search This Blog

Wednesday, December 02, 2009

Real Privacy Management is built for speed

Scammers get better tools for tapping social networks; Securuty review: Good riddance to 2009
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by McAfee
rule

Secure in 15 - Start with Daily Practices
Get the Secure in 15 toolkit starting with the "15 Minutes Month-at-a-Glance" calendar. McAfee will send you additional tools and tricks to stay protected around the clock.

Click here to learn more.

rule

Spotlight Story
Real Privacy Management is built for speed

I like to think of PKI -- Public Key Infrastructure -- as better than no encryption at all, but only slightly. It's cumbersome to set up and maintain. It's expensive in terms of both money and CPU cycles. And it's off the end of the scale when it comes to user unfriendliness. I sure wish there was something better. Read full story

Related News:

Scammers get better tools for tapping social networks
New tools capable of quickly finding, gathering and correlating information about individuals from social networking sites and other public sources are giving online scammers a powerful new weapon, say security researchers.

Securuty review: Good riddance to 2009
Looking back at 2009, I'm sure I will not be alone in celebrating the end of the year with gusto. 2009 was a difficult year for most, with a slow recovery and challenging business conditions. Let's see how I did predicting security trends in 2009.

Cloud security service looks for malware
Webroot Tuesday announced it has extended its cloud-based Web security service, adding a way to filter outbound as well as inbound Web traffic, monitoring for threats in order to detect and block malware such as botnets that have infected computers.

Northrop Grumman launches cybersecurity research group
Government security contractor Northrop Grumman has joined with three leading cybersecurity research universities to launch a research consortium focused on fixing the most vexing problems in information security.

Rogue Gallery Helps ID Scam Software
If you're trying to figure out whether that "MalwareDefender2009" program is a legit app or a scam, a new listing of the known scams can help.

Today from the Subnet communities

On Cisco Subnet: Why IBM Bought Guardium and Cisco extends Tandberg deadline again; On Microsoft Subnet: Microsoft moves to hands-on certification tests; On Google Subnet: Chrome OS will rely on not-yet-finished HTML 5 spec for offline app access

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.


Take Control of Change, Configuration & Compliance
Live: Wednesday, December 9th 2 PM ET / 11 AM PT. Join Industry experts as they discuss how IT management can now automate continuous configuration compliance across their server infrastructures to maintain security, comply with regulations, follow configuration best practices, and meet SLAs.
Register today!

 

December 02, 2009

MOST-READ STORIES

  1. Latest Microsoft patches cause black screen of death
  2. Is Apple testing a new iPhone model?
  3. Avaya's Nortel buy might not power it over Cisco
  4. Ye olde vintage computer gift guide
  5. 10 IT management technology start-ups to watch
  6. Typewriter puts identity thieves in federal prison
  7. IBM buys database security firm Guardium
  8. Users don't buy Microsoft's Exchange 2010 savings claims
  9. Is certification valuable, or not?
  10. After year of trouble, Big Bang machine breaks world record

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.
Learn more



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: