Monday, January 04, 2010

Lessons learned from the 'Underwear Bomber'

Top 10 Security Nightmares of the Decade; NASA Mars rover Spirit has survivability option?
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Sophos
rule

Resources for Security
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.

Visit this site today!

rule

Spotlight Story
Lessons learned from the 'Underwear Bomber'

You might know him as the "Underwear Bomber" (the "Pants Bomber" in the United Kingdom) or, in less exalted circles, the "Crotch Bomber." But however you refer to him, it's clear that Umar Farouk Abdulmutallab has been the major topic of conversation over the past 10 days. What hasn't been touched on yet (at least I haven't seen it) is the lesson this can teach us about identity systems. Read full story

Related News:

Top 10 Security Nightmares of the Decade
Blame the Internet for the latest decade of security lessons. Without it, you probably wouldn't even recognize the terms phishing, cybercrime, data breach, or botnet. Let's revisit the top security horrors of the past ten years, and try to remember what we learned from each.

NASA Mars rover Spirit has survivability option?
As NASA celebrates its Mars rover Spirit's sixth anniversary exploring the red planet it is hunting for a way to keep the machine, which is mired in a sand trap, alive to see a seventh year. On its Web site, the space agency this week noted there may indeed be such an option.

Security and Building Design: A Decade of Change
Building security design barely made the radar screen of most architects a decade ago. But as architect Barbara A. Nadel explains, the last decade brought the issue front and center.

Obama can't have a BlackBerry. Should your CEO?
Information security is not as strong as you may think, and the execs with the most sensitive data are juicy targets

2010 Prediction Roundup: From Outlandish to Likely
It's time to turn the page on 2009 and look into a crystal ball to the year ahead. PC World's own prognosticators have declared 2010 the year of the tablet computer , year of the Droid , year of the Mac and some even think 2010 might be Blu-ray's time to shine. But enough about PC World.

Managed security service packs a lot of protection into one box
Many small and midsize companies don't have the means to provide adequate and broad network security measures in-house. Yet these companies experience the same threats from the Internet as large companies with specialized security experts. A managed security service can provide strong security measures that are always current and that address a wide range of threats.

NASA and space station alliance on shaky ground
Even as the latest shift of astronauts arrived at the International Space Station, NASA challenges with the orbital outpost  on the ground are threatening its future.

The 5 essential patches of 2009
A panel of security experts helps Computerworld come up with the top five patches that users should have deployed over the past 12 months -- or should deploy as soon as possible.

Today from the Subnet communities

On Cisco Subnet: John Chambers says big is back and Cisco is the example and Howard Schmidt Appointed as New Cybersecurity Coordinator; On Microsoft Subnet Microsoft loses appeal: injunction against selling MS Word reinstated; On Google Subnet: Google Doodles 2009: a year in review.

Network World on Twitter? You bet we are


Decade in tech
Ethernet everywhereHere is a quiz on the most important or quirkiest tech stories to hit the front pages over the first 10 years of the 2000s.

Cool Yule Tools
Windows 7Best picks from this year and a look back at 10 years of tech toys and gadgety gifts.

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.


Vulnerability Management Checklist
Discover the 12 key decision points you need to consider when choosing a vulnerability management solution. This checklist walks you step-by-step through critical questions to ensure you select the solution that will best protect your network and data.
Learn more now.

 

January 04, 2010

MOST-READ STORIES

  1. Microsoft rebels
  2. Apple rumored to announce tablet on Jan. 26
  3. 5 must-have IT management technologies for 2010
  4. Caught on tape: Burglars target wrong techie
  5. Court rejects Microsoft appeal, bans Word sales
  6. What's next for MPLS?
  7. Smartphone attacks, rogue antivirus top 2010 security concerns
  8. The 5 essential patches of 2009
  9. Nortel sells carrier VoIP biz to Genband for $282 million
  10. Watch out Microsoft: GNOME is poised to have a killer 2010

Linux and Unix in Your Environment? Don't Leave Security to Chance
Most businesses today rely on the stability and power of Linux or Unix in their data centers. However, these venerable platforms also create some compliance and security challenges.In this white paper, you'll learn to get the most from your Linux or Unix environment, while ensuring your data is safe and secure.
Learn More



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment