Search This Blog

Friday, December 03, 2010

Why license compliance is so hard; Is a next-gen firewall in your future?

Is a next-generation firewall in your future? | How secure is Windows Phone 7 app code?

Network World Compliance

Forward this to a Friend >>>


Why is license compliance so %$#$% hard?
Mark Gibbs challenges the BSA to make our lives easier Read More


WHITE PAPER: Symantec

Lessons Learned from Windows 7 Early Adopters
Download this paper of emerging best practices to help you overcome the most common migration challenges. Learn more.

In this Issue


WHITE PAPER: VMware

How business-critical database workloads perform
This white paper documents the performance of mission-critical database workloads running on servers equipped with the Intel Xeon processor 7500 series and VMware vSphere 4. Read Now.

Is a next-generation firewall in your future?
The traditional port-based enterprise firewall, now looking less like a guard and more like a pit stop for Internet applications racing in through the often open ports 80 and 443, is slowly losing out to a new generation of brawny, fast, intelligent firewalls. Read More

How secure is Windows Phone 7 app code?
A recent Microsoft glitch made it possible for developers to bypass the Zune marketplace and download their Windows Phone 7 app of choice. Though Microsoft closed that loopohole, the incident sparked debate over how to secure application code, a problem that affects more than WP7 developers. Read More

WikiLeaks is not the actual problem
Another day, another quarter of a million confidential government documents released via WikiLeaks. Read More

What security wrought in 2010
Every year, I try to predict the top trends in security for the upcoming year. To give myself a sense of accountability I always look back at how well those predictions worked out and either abandon them or double-down for the next year! It's time to test my annual security predictions for 2010. Read More

Prevent Your Data from Becoming the Next WikiLeaks Headline
WikiLeaks is making as many waves as it is headlines these days--challenging the balance between the right to free speech and the need to defend national security interests. In a recent Forbes interview Julian Assange, founder of WikiLeaks, revealed that the site is expanding beyond government intelligence to begin unveiling corporate secrets as well. Read More

Trend Micro Purchase Boosts Data Protection
Trend Micro announced that it has signed a definitive agreement to acquire Mobile Armor--a company that specializes in endpoint data protection. The move strengthens Trend Micro's data protection capabilities and positions it to address the growing concern of securing data on mobile devices that are easily lost or stolen. Read More

User activity monitoring answers the age-old questions of who, what and when
The city of Richmond, Va., had a user access problem. Due to an inadvertent misconfiguration of Active Directory, internal users were able to access systems and databases that they shouldn't have had access to. A user activity monitoring tool helped the city see the inappropriate access and lock down their systems. Read More


WHITE PAPER: Vyatta

Vyatta Replacement Guide - Cisco
Comparison guide highlighting the dramatic price/performance differential between Vyatta software and appliances and the Cisco ISR, ASA and ASR product families. Read now!

Watch Your Back! Snoopers are After Your Data
Next time you're sitting at your neighborhood Starbucks surfing the Web and you get that sense that somebody is watching you--take heed. They probably are. Using a computer in public comes with the added risk that those nearby may be able to glean sensitive information by casually viewing your display over your shoulder. Read More

Quantum key 'blinding' hack deeply flawed, say researchers
The 'blinding' hack of quantum key distribution (QKD) systems publicised by Norwegian researchers earlier this year was based on a seriously flawed setup of the equipment being eavesdropped upon, scientists at Toshiba's Cambridge Research Lab have said. Read More

Toshiba laptop drive embraces new security features
Toshiba has become the latest storage vendor to build Opal Security Subsystem Class (Opal SSC) specification into its self-encrypting drive (SED) for PCs and laptops, the MKxx61GSYD. Read More

ICSA seeks to establish tests of endpoint security products
ICSA Labs is seeking industry input as it creates test criteria for endpoint security products that will ultimately be used to certify whether the products are up to par. Read More

Significant distinctions in mobile management and security
So what do we do? How can we protect our resources yet still enable business and stay compliant? Well if you like hanging out at a place called jail, do nothing. But as most of us would prefer a life outside of prison, you need to not just manage but secure these devices. But how can we do that? Read More

iPad, WikiLeaks, Chatroulette among top AOL search terms for 2010
Apple's iPad and iPhone dominated AOL's list of year-end hot shopping search terms, though technology terms had a fairly weak showing on AOL's overall hot searches list, which beats the rush of year-end trend reports by coming out at the end of November. Read More

Feds draw a bead on Russian behind Mega-D botnet
An Internet ring hawking counterfeit male-enhancement remedies, phony Rolexes and generic pills with false FDA approval has led the FBI to a Russian believed to be behind the Mega-D botnet. Read More


WHITE PAPER: CA

The Most Important Metric for your VMs
The management tools selected to support virtualization is essential to the ability of IT to grow the virtual environment without proportionately increasing the staff to manage all of the new physical host servers and their guest VMs. Learn More

Free Software Foundation's software repository hacked
The GNU repository has been compromised by a SQL Injection attack Read More

FTC calls for online do-not-track list to protect privacy
The FTC endorses a national do-not-track list to protect consumers online. Read More

What you should know about Next Generation Firewalls
So what is the so-called Next Generation Firewall? Read More

Cloud 'exacerbates' privacy issues: EFA
Educating the enterprise about the privacy risks of using the cloud is vital, Electronic Frontiers Australia (EFA) has warned. Read More

Microsoft Security Essentials 1.0
When we looked at the beta of Microsoft Security Essentials in 2009, we were impressed with its clean, easy-to-use interface, but less so with its sluggish scan speed. This still holds true for Microsoft Security Essentials 1.0; also, it hasn't kept pace with newer antivirus products when it comes to detecting malware. Read More

Fortinet unveils high-speed security blade for Fortigate-5000 chassis
Fortinet today introduced a high-speed security blade that combines a slew of capabilities -- including firewall, VPN, intrusion prevention, identity-based application controls, anti-virus, anti-spam and Web filtering -- and delivers up to 40G bit/sec throughput. Read More

Helping employees get corporate security policy
Employee awareness of their companies' security policies is high--if you ask the employees. In a survey of 2,000 office workers, software security company Clearswift found almost three quarters, 74 percent, felt 'confident' that they understand their employers' Internet security policies. That is, policy designed to safeguard data and IT security, as well as maintain productivity. But the confidence is misplaced, Clearswift suggests in their summary of the findings, because a third of those surveyed have not received any training on IT security since joining their firm. And more than two thirds of those who have not had recent training joined their organization more than five years ago--a 'technological lifetime,' notes Clearswift. Read More

Ransomware rears ugly head, demands $120 to unlock files
Ransomware is making a comeback, plaguing users with extortion demands of up to $120 to return documents or drives to their control, security experts said today. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

December goodies from the Subnets
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Amazon reportedly shows WikiLeaks the door
  2. IBM chip breakthrough may lead to exascale supercomputers
  3. Is a next-generation firewall in your future?
  4. The Linux desktop revolution is dead
  5. The first rule of Windows Phone 7 sales
  6. Verizon sets the bar for future LTE launches
  7. Microsoft's dropped feature is Linux's gain
  8. Inside the labs at Microsoft, HP and IBM
  9. Women desire iPhones, men want Android smartphones
  10. WikiLeaks is not the actual problem

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: