Search This Blog

Thursday, September 24, 2009

Startups see dollar signs in sex; What's the biggest firewall issue for enterprises?

What's the biggest firewall issue for enterprises?; Credit-card security standards questioned, survey says
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Security Virtual Trade Show Sept09
rule

Win a 32"LCD at on Sept. 29th
Security Directions: A Virtual Conference Presented by - CIO, Computerworld, CSO, InfoWorld & Network World. Join us for "Protecting Your Enterprise in a Dynamic Infrastructure" - a unique online security event. Listen to CSO publisher, Bob Bragdon and a panel of experts and users, to hear about real-world security deployments. And just for attending, you'll have a chance to win a flat screen LCD TV.

Register Now!

rule

Spotlight Story
Startups see dollar signs in sex

Technology can help mitigate the new dangers presented by online dating and the "hook-up" culture of today's youth, as well as the long-present threat of sexual misconduct by trusted authority figures, according to three companies presenting at the DEMO conference on Tuesday. Read full story

Related News:

What's the biggest firewall issue for enterprises?
Out of 251 new Cisco CCIEs tallied in the most recent worldwide CCIE count, only 1 newly minted Security CCIE was included. Hopefully, the following Q & A with Matt Keil - product manager for firewall vendor Palo Alto Networks, will help us understand the current dynamics of the firewall marketplace as well as enterprise security in general. 1. What's the biggest firewall issue for enterprises...

Credit-card security standards questioned, survey says
Most IT security professionals who must comply with the industry standards to protect credit card data think those standards have no impact at all on actual security, according to new study by Ponemon Institute.

'Anonymous Digging'? What could go wrong?
This post will likely interest only those readers who use Digg. The rest of you are excused.

FBI building system that blows away fingerprinting
The FBI plans to migrate from its IAFIS fingerprint database to a new biometrics system that will include DNA records, 3-D facial imaging, palm prints and voice scans.

How the Defense Department might institutionalize war-time biometrics
The Defense Department is looking to turn its war-time biometrics experience into an enduring weapon at home and abroad.

Privacy advocates hail Facebook's plan to shutter Beacon
Privacy advocates are applauding Facebook's willingness to shut down its controversial Beacon service as a part of a broader settlement in a class-action lawsuit against the company.

7 Ways Security Pros DON'T Practice What They Preach
IT security pros spend oodles of time trying to hammer best practices into the heads of fellow employees. But in an informal poll conducted by CSOonline, many admitted they don't always follow their own advice.

A data breach with a twist
An employee at a Wyoming bank screws up and sends a bunch of confidential customer information to the wrong Gmail account. When the inadvertent recipient fails to even acknowledge a subsequent "please delete that" plea from the bank, the bank sues Google to force the company to cough up the recipient's contact information.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

BeyondTrust PowerBroker: Root Access Risk Control for the Enterprise
Compliance efforts and security concerns have driven businesses to make substantial investments in threat control. In this paper, EMA analysts examine BeyondTrust PowerBroker, a comprehensive solution designed to close these gaps for the enterprise with provable control.
Read More


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 24, 2009

MOST-READ STORIES

  1. Lotus goes after Microsoft's 'ridiculous and fabricated' figures
  2. A data breach with a twist
  3. Court to scammer: Give up your house or go to jail
  4. Microsoft declares war on 'scareware'
  5. 13 hot products from DEMOfall '09
  6. Machines could ultimately match human intelligence, says Intel CTO
  7. Cisco taps Microsoft exec to head collaboration
  8. Best smartphones for under $100
  9. FCC's net neutrality plan draws fast fire
  10. Microsoft urges users to disable vulnerable Win net protocol

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: