Search This Blog

Tuesday, May 29, 2007

Security Report: Securent takes access control to a new level

========================================================================
SECURITY REPORT

http://www.infoworld.com/
========================================================================
Tuesday, May 29, 2007

* Securent takes access control to a new level
* Spyware bill's chances uncertain in US Senate
* Password-cracking challenge update: second password revealed
* Unpatched Symantec flaw leads to university data breach
* Oakley SureView puts insider threats in context
* Researcher: RSA 1024-bit encryption not enough
* Spyware bill passes House
* Companies open wallets for secure data

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT

ENDPOINT SECURITY: IT'S MORE THAN JUST ENCRYPTING BITS ON DISKS!

Securing data-at-rest requires enough flexibility to accommodate
today's workforce dynamics (all devices, users, and locations) while
consistently enforcing security rules-easily and painlessly-with no
compromise to user experience. Four requirements can help ensure
mobile data encryption as an integral part of your enterprise's
overall security processes. Download whitepaper.

http://newsletter.infoworld.com/t?ctl=17A5953:20920CD98AAF82DD74CAE1395F5E1E59EFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
INFOWORLD ZERO DAY PODCAST

Covering business and IT strategies for securing the enterprise,
InfoWorld's Bob Garza covers anti-spam, anti-spyware, application layer
security, biometrics, digital identity, intrusion detection, malware and
more Sponsored by IronPort.

http://newsletter.infoworld.com/t?ctl=17A594D:20920CD98AAF82DD74CAE1395F5E1E59EFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --

========================================================================

SECURENT TAKES ACCESS CONTROL TO A NEW LEVEL

Many enterprises are desperately seeking the magic combination of
identity and access management technologies to protect against hackers
and insider threats -- and to pass external compliance audits. The
founders of Securent think they have a brand new approach to the
problem.

http://newsletter.infoworld.com/t?ctl=17A594B:20920CD98AAF82DD74CAE1395F5E1E59EFF29049075316B4

========================================================================

SPYWARE BILL'S CHANCES UNCERTAIN IN US SENATE

An antispyware bill that the U.S. House of Representatives passed this
week earned praise from cybersecurity groups, but faces an uncertain
future in the Senate.

http://newsletter.infoworld.com/t?ctl=17A5947:20920CD98AAF82DD74CAE1395F5E1E59EFF29049075316B4

========================================================================

PASSWORD-CRACKING CHALLENGE UPDATE: SECOND PASSWORD REVEALED

The password hacking contest I started 10 months ago is two-thirds over.
We have a winner for the second of three hash challenges...I just
don't know who they are.

http://newsletter.infoworld.com/t?ctl=17A594A:20920CD98AAF82DD74CAE1395F5E1E59EFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT

ENDPOINT SECURITY: IT'S MORE THAN JUST ENCRYPTING BITS ON DISKS!

Securing data-at-rest requires enough flexibility to accommodate
today's workforce dynamics (all devices, users, and locations) while
consistently enforcing security rules-easily and painlessly-with no
compromise to user experience. Four requirements can help ensure
mobile data encryption as an integral part of your enterprise's
overall security processes. Download whitepaper.

http://newsletter.infoworld.com/t?ctl=17A5953:20920CD98AAF82DD74CAE1395F5E1E59EFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
========================================================================

UNPATCHED SYMANTEC FLAW LEADS TO UNIVERSITY DATA BREACH

An unpatched flaw in a Symantec anti-virus management console resulted in
the compromise of a server containing the names and Social Security
numbers of nearly 45,000 students at the University of Colorado at
Boulder.

http://newsletter.infoworld.com/t?ctl=17A5949:20920CD98AAF82DD74CAE1395F5E1E59EFF29049075316B4

========================================================================

OAKLEY SUREVIEW PUTS INSIDER THREATS IN CONTEXT

Many content monitoring and filtering and information leak prevention
solutions attempt to stop insider threats by reversing the old firewall
strategy: They completely block a particular outbound communications
channel, such as instant messaging.

http://newsletter.infoworld.com/t?ctl=17A594C:20920CD98AAF82DD74CAE1395F5E1E59EFF29049075316B4

========================================================================

RESEARCHER: RSA 1024-BIT ENCRYPTION NOT ENOUGH

The strength of the encryption used now to protect banking and e-commerce
transactions on many Web sites may not be effective in as few as five
years, a cryptography expert has warned after completing a new
distributing-computing achievement.

http://newsletter.infoworld.com/t?ctl=17A5946:20920CD98AAF82DD74CAE1395F5E1E59EFF29049075316B4

========================================================================

SPYWARE BILL PASSES HOUSE

The U.S. House of Representatives passed an antispyware bill Tuesday on a
voice vote.

http://newsletter.infoworld.com/t?ctl=17A5948:20920CD98AAF82DD74CAE1395F5E1E59EFF29049075316B4

========================================================================

COMPANIES OPEN WALLETS FOR SECURE DATA

An annual VanDyke Software-sponsored survey of IT network and systems
administrators finds that businesses have increased their spending on
secure data communications technologies and also have undertaken
significant work to improve their internal processes to benefit
security.

http://newsletter.infoworld.com/t?ctl=17A5945:20920CD98AAF82DD74CAE1395F5E1E59EFF29049075316B4

======================================================================

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT

ENDPOINT SECURITY: IT'S MORE THAN JUST ENCRYPTING BITS ON DISKS!

Securing data-at-rest requires enough flexibility to accommodate
today's workforce dynamics (all devices, users, and locations) while
consistently enforcing security rules-easily and painlessly-with no
compromise to user experience. Four requirements can help ensure
mobile data encryption as an integral part of your enterprise's
overall security processes. Download whitepaper.

http://newsletter.infoworld.com/t?ctl=17A5953:20920CD98AAF82DD74CAE1395F5E1E59EFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -

DAILY NEWS, DELIVERED TO YOUR COMPUTER, MP3 PLAYER OR CELL PHONE

The InfoWorld Daily podcast provides readers with
up-to-the-minute news and features that shape the world
of enterprise IT. Tom Sullivan reports on the leading news
and events that shape the today's IT community.

http://newsletter.infoworld.com/t?ctl=17A594E:20920CD98AAF82DD74CAE1395F5E1E59EFF29049075316B4

======================================================================

ADVERTISE

To advertise, contact Kate_Hobbie@infoworld.com.

======================================================================

UNSUBSCRIBE/MANAGE NEWSLETTERS

To subscribe, unsubscribe or change your e-mail address for any of
InfoWorld's e-mail newsletters, go to:
http://newsletter.infoworld.com/t?ctl=17A594F:20920CD98AAF82DD74CAE1395F5E1E59EFF29049075316B4

Contact Customer Service at: customerservice@infoworld.com

To view InfoWorld's privacy policy, visit:
http://newsletter.infoworld.com/t?ctl=17A5951:20920CD98AAF82DD74CAE1395F5E1E59EFF29049075316B4

Copyright (C) 2007 InfoWorld Media Group.
501 Second St., San Francisco, CA 94107


This message was sent to: security.world@gmail.com

No comments: