Search This Blog

Wednesday, June 23, 2010

The low-down on NAC, Windows-style

  Security group stretching payment-card standards cycle to three years | Death of Windows XP SP2 Support a Security Risk, Says Report
 
  Network World Security

Forward this to a Friend >>>


The low-down on NAC, Windows-style
Network World has completed a massive test of 12 network access control systems including the one from Microsoft known as Network Access Protection. NAP is certainly not the most functional NAC implementation we tested, says tester Joel Snyder, "but it has a huge advantage over every other strategy: it's built-in to Windows. Read More


RESOURCE COMPLIMENTS OF: Websense

Websense® TRITON™ — Unifying Web, Data, and Email Security
Websense TRITON™ is the IT industry's first and only unified content security architecture that integrates best-in class Web, email and Data security technologies into a single solution set. Unrivaled, TRITON brings to market the best security against modern threats at the lowest total cost of ownership (TCO). Click to continue

RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

Security group stretching payment-card standards cycle to three years
The Payment Card Industry Security Standards Council Tuesday announced it will begin moving to a three-year cycle related to the main technical standards it issues for protection of sensitive payment-card information, allowing merchants and others more time to adopt them. Read More

Death of Windows XP SP2 Support a Security Risk, Says Report
With Windows XP SP2 support ending in three weeks, a new report highlights the security risks that come with running an unsupported service pack. Read More

Why security needs to catch up to Web 2.0
Security managers can keep blocking Facebook, refusing to support mobile devices and vetoing cloud-based services, but they aren't going away. And ignoring ways to make room for them in your security program is like burying your head in the sand, according to Tom Gillis, vice president and general manager of Cisco's security technology business unit, and author of the new book Securing the Borderless Network: Security for the Web 2.0 World. Read More


WHITE PAPER: F5 Networks, Inc.

7 Key Challenges You Can't Ignore
7 Key Challenges You Can't Ignore 7 Key Challenges You Can't Ignore

Too many data-loss prevention tools become shelfware, says analyst
The good, the bad and the ugly of data-loss prevention tools and technologies got a solid once over from Gartner analyst Eric Ouellet, who spared no punches during his presentation on the topic during the first day of Gartner's Security & Risk Management Summit. Read More

Apple Headed for Privacy Row With iOS 4 Update
Apple may be about to get roped into the privacy policy debate that has dogged other technology companies like Facebook and Google over the past few months. On Monday, Apple quietly updated its privacy policy as part of the iOS 4 update to allow the company to collect and share your Apple device's location information, as first reported by The Los Angeles Times . Read More

NAC access control: A multi-dimensional puzzle
To understand how access control is done in NAC products, you have to look along three dimensions: where access controls are enforced, how access control is communicated, and the granularity of access control. Read More


WHITE PAPER: Qualys Inc.

Key questions to ask when evaluating solutions
Key questions to ask when evaluating solutions Key questions to ask when evaluating solutions

Biggest tech industry apologies of 2010 – so far
AT&T, Facebook, Google, McAfee, Adobe and others say "We're sorry" for assorted security, privacy and performance problems in 2010. Read More

Microsoft patching tamed by Qualys tool
Qualys has added a new reporting feature to its vulnerability management service that helps IT staff work out which Microsoft patches to apply and in what order. Read More

Friendly Reminder to those who are PCI compliant.. WEP must die in next 12 days.
If your business is PCI compliant, you hopefully are already fully aware that June 30th, 2010 is the deadline to be migrated off of WEP in any area of your network that is involved in credit card handling based on PCI definition and your own logical networking design.While I'd generally hope that most people had moved off of WEP years ago, you still see it in some POS systems from time to time. Depending... Read More

Did the government sit on the 'scareware' case too long?
A few weeks ago when I wrote about federal criminal charges being brought against two alleged cyber criminals in Russia and one in Ohio, I wrote that we could "Score one for the good guys" because law enforcement caught up with some of the often elusive perpetrators of online fraud.But one commentor, "Joseph," wrote that the authorities waited too long to nab Bjorn Daniel Sundin, 31, of Sweden, Shaileshkumar... Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

A brief history of smartphones
How the smartphone went from a high-end enterprise device to an everyday consumer staple.

Summer gadget guide 2010
From a solar-powered watch to a speaker for your bike helmet and a nifty geocache finder, these 10 high-tech toys are perfect for summer.

MOST-READ STORIES

  1. California considers digital ads on car license plates
  2. Securing 4G smartphones
  3. Cisco Announces the CCIE Emeritus Program
  4. Use EFF's Firefox Add-on To Encrypt Your Web Browsing
  5. 40/100G Ethernet standard ratified
  6. New Apple iOS 4 APIs expand iPhone device management
  7. Ultimate guide to network access control products
  8. Hands on with iOS 4 folders
  9. Apple delivers iOS 4, users report back-up problems
  10. Microsoft quietly releases Exchange 2007 SP3 on Sunday

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: