Wednesday, September 08, 2010

Symantec updates Enterprise Vault, ties to Microsoft cloud apps

  Microsoft targets high schoolers with newest entry-level cert | Hacking a simple access control system
 
  Network World Security

Forward this to a Friend >>>


Symantec updates Enterprise Vault, ties to Microsoft cloud apps
Symantec Tuesday unveiled updated storage and backup gear, giving Enterprise Vault 9.0 a way to integrate archiving and discovery-related legal requests with Microsoft's cloud-based Business Productivity Online Services. Read More


WHITE PAPER: Symantec

Small Business Owners: Ensure Business Continuity
Read this analyst Whitepaper for a sound data protection strategy. Read Now.

WHITE PAPER: Watchguard

10 questions to ask before you buy an anti‐spam solution
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

Microsoft targets high schoolers with newest entry-level cert
With school back in session, Microsoft is looking to drum up interest for its newest entry-level certification program geared for students as young as high school. The program, announced in July, is dubbed the Microsoft Technology Associate certification. Schools sign up to be providers by buying a license that allows them to administer up to 1,000 exams per year. Read More

Hacking a simple access control system
I was recently asked to create a quick solution for a Web site that needed to allow each guest invited by snail mail to enter a unique access code on a Web site to access a registration form for an event. The reason for not using name/password access control was that the organizers wanted to keep it as simple as possible for the guests and felt that having them enter just one number would be the best plan. Read More

Feedback on The National Strategy for Trusted Identities in Cyberspace
Anyone remotely interested in identity management should definitely download a copy of the National Strategy for Trusted Identities in Cyberspace (NSTIC) document. It can be found at this link: http://www.nstic.ideascale.com/. Read More


WHITE PAPER: F5 Networks, Inc.

The Antidote to DNS Cache Poisoning and Other DNS Attacks
Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn't working, then your business likely isn't either. Secure your business and web presence with Domain Name System Security Extensions (DNSSEC). Learn more!

ICO compares TalkTalk anti-malware technology to Phorm
The Information Commissioner's Office has compared TalkTalk's new anti-malware technology to controversial targettered advertising firm Phorm. Read More

Enterprise risk management: Get started in six steps
Let's say your organization doesn't have a formal enterprise risk management program. If you're at a big company, ERM might seem daunting because of silos, inertia and so on. Read More

Spammers exploit second Facebook bug in a week
Facebook today said it has fixed the bug that allowed a spamming worm to automatically post messages to users' walls earlier this week. Read More


WHITE PAPER: NetGear

In-The-Cloud Distributed Spam Analysis Technology
Distributed Spam Analysis technology provides the best protection against email-borne threats by providing more frequent threat updates that can quickly be leveraged by security solutions. Learn more.

Apple had two months to fix critical QuickTime bug, says researcher
A critical bug in QuickTime was reported to Apple two months before a second researcher independently revealed the vulnerability this week, the director of a bug bounty program said Friday. Read More

Cloud Security Alliance offers certification
IT virtual-security experts can now show off their knowledge with a certificate that shows they've mastered the contents of two cloud-security papers. Read More

ACLU, other groups sue US gov't over border laptop searches
The American Civil Liberties Union and other groups have filed a lawsuit challenging the U.S. Customs and Border Protection (CBP) practice of searching laptops and other electronic devices at U.S. borders. Read More

Return of the Spam Heckler
About a year ago, I wrote an article for this site that began by praising the craft required to produce a spam header intriguing enough to coax an innocent recipient into opening the unsolicited message (see "Straight to the Spam Folder: Astonishing E-Mail Messages You'll Never Open"). Then I spent the rest of the story mocking various spam headers that editors at PCWorld had recently received. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Are you the corporate geezer?
Our first Geezer Quiz in 2009 has been so popular that we've created this new set of questions that will test your memory and perhaps also bring on a wave of nostalgia for the days of minicomputers, X.25 and token ring. Keep score and see how well you do at the end. Enjoy!

The hottest virtualization products at VMworld
With VMworld kicking off in San Francisco, this is one of the biggest weeks of the year in the virtualization industry. VMware, Citrix, EMC and many other companies are releasing new virtualization technologies or adding virtualization capabilities to existing products. Here's a roundup of what's being announced this week.

MOST-READ STORIES

  1. Burning Man's open source cell phone system could save the world
  2. Only 5 (all women) of 135 pass Defcon social engineering test
  3. Open source: No one is working for free
  4. More than 1 in 10 Mozilla bug finders turn down cash
  5. Next gen Apple iPad to add FaceTime video calling?
  6. The most dangerous jobs in technology
  7. 11 funny UK sights on Google Street View
  8. Cisco, Verizon power massive IP net at new Meadowlands stadium
  9. 6 useful Wi-Fi tools for Windows
  10. iPhone 4 Wi-Fi proves a challenge for university
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment