Tuesday, May 25, 2010

NAC: What went wrong?

Cisco's NAC goes off track, customers taken aback | Microsoft smacks patch-blocking rootkit second time

Network World Security

Forward this to a Friend >>>


NAC: What went wrong?
After spending four months in the lab testing the 12 leading network access control products, we've come to this conclusion: Five years of hype, buzzwords, white papers, product launches, standards battles and vendor shakeouts have resulted in very little in the way of clarity. Agreement on what NAC really means and the right approach to NAC remain as elusive today as in 2005, when the first NAC products burst on the scene. Read More


WHITE PAPER: MessageLabs

Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

WHITE PAPER: Novell

File Management Suite
Better track and understand storage patterns, allocate and manage storage based on its relevance and value to the business, while saving money in the administration and procurement of storage resources. Learn to get a handle on the unchecked proliferation of data. Read Now

Cisco's NAC goes off track, customers taken aback
As the most important supplier of network infrastructure to enterprises, Cisco's NAC products are a natural point of curiosity for network managers. Unfortunately, though, Cisco's approach to NAC has been riddled with in-fighting, false starts, delayed product releases, and a good dose of chaos and confusion. Read More

Microsoft smacks patch-blocking rootkit second time
MSRT has scrubbed mutating Alureon rootkit from more than 360,000 Windows-based PCs since May 11. Read More

Bugs and Fixes: Security Woes for Windows, McAfee, Firefox
The bugs keep marching in, with Microsoft, McAfee, and Mozilla all having to deal with serious security-related software problems in the past month. Read More

Researchers warn of "Typhoid Adware" at Internet cafes
It's no secret that you take some security chances when surfacing the Web at WiFi hotspots at Internet cafes, but University of Calgary researchers have shed light on a new potential threat you might not have considered: Adware that shows up on your computer even though it is actually running on the computer of someone sharing the unencrypted network. The researchers dub the threat "Typhoid Adware"... Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

NASA preps advanced technology for the future, now
While congress continues to wrangle over the future of specific space agency programs - in particular Read More

NAC standards wars end in truce
The Trusted Computing Group's Trusted Network Connect (TNC) is an industry-supported working group developing NAC architecture documents and standards. The first public documents came out of TCG's TNC in 2005 after a year of work, and the group has continued to publish NAC standards and fill out their NAC architecture every year. Read More

Self-replicating nanobots
One of the scariest issues I can think of with respect to nanotechnology is self-replicating nanobots. Read More

Google offers SSL searching to boost privacy
Google users can now search the Internet using SSL encryption to hide search terms from prying third parties. Read More


WHITE PAPER: Websense

Essential Information Protection
Successful organizations depend upon their ability to collaborate, communicate, and share information online. This paper explains how Essential Information Protection is designed to help organizations make the most of their IT security investments. Read More

Good-Bye to Privacy?
New Yorker Barry Hoggard draws a line in the sand when it comes to online privacy. In May he said farewell to 1251 Facebook friends by deleting his account of four years to protest what he calls the social network's eroding privacy policies. Read More

Poisoned PDFs? Here's Your Antidote
Attacks employing poisoned PDF files have leaped to the top of the threat list, according to statistics from major security companies. Symantec reports that suspicious PDF files skyrocketed in 2009 to represent 49 percent of Web-based attacks that the company detected, up from only 11 percent in 2008. The next-most-common attack, involving a good old Internet Explorer flaw, was far behind at 18 percent. Read More

ZoneAlarm adds more stuff to its Free Firewall
If you are managing a lot of computers in your home office environment, chances are you're using a free firewall product, and it's probably from CheckPoint's ZoneAlarm division. If you do, there's good news today, as the company has announced a new version with updated features and "more stuff" to consider. The company has added its DefenseNet service (already available on its Pro versions),... Read More

Bugnets Could Spy on You via Mobile Devices
Imagine sitting in a café and discussing the details of a business proposal with a potential client. Neither you nor the client has a laptop; you're just two people having a conversation. But unbeknownst to you, someone half a world away is listening to every word you say. Later, as you leave, you receive a text message referring to the proposal and demanding money in exchange for silence. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Car hackers can kill brakes, engine, and more
Researchers at the University of Washington and UC San Diego have taken a close look at the computer systems used to run today's cars and discovered new ways to hack into them, sometimes with frightening results.

20 Crazy Concept Phones
From snake phones to handsets that look like hockey pucks, these hopelessly impractical devices are the coolest-looking phones you'll never want to own.

MOST-READ STORIES

  1. Cisco's NAC goes off track, customers taken aback
  2. Seagate invents new type of laptop hard drive
  3. HP recalls batteries that post a fire hazard
  4. NAC: What went wrong?
  5. Apple reverses its 'No cash for iPad' policy
  6. Your old computer, born again
  7. IBM red-faced after handing out infected USB drives
  8. Google's Pac-Man 30th birthday present: Free game forever
  9. Black duck eggs and other secrets of Chinese hackers
  10. Be careful using VMotion over the WAN

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment