Search This Blog

Thursday, February 26, 2009

Bluetooth is not a dental condition

NIST guide to Bluetooth security
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Juniper Networks
rule

Expert advice on improving a data center
Discover how to significantly simplify your data center architecture while containing costs and improving efficiency and reliability. On March 12, data center design and implementation experts will share in-depth advice on new approaches and examples of deployments - including price, performance and savings. Register for this Live Webcast now.

rule

Spotlight Story
Bluetooth is not a dental condition

M. E. Kabay By M. E. Kabay
Computer scientists Karen Scarfone of the Computer Security Division of the Information Technology Laboratory at the NIST has collaborated with John Padgette, an associate at Booz Allen Hamilton to write a new Special Publication entitled "Guide to Bluetooth Security," which summarizes the security issues and provides recommendations for protecting sensitive information carried via these wireless systems. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Network World on Twitter Get our tweets and stay plugged in to networking news.

New Bluetooth standards to bring speed, energy efficiency Although Bluetooth technology is commonly used today for syncing up mobile devices with headsets or for wirelessly networking PCs with mice and printers, the Bluetooth Special Interest Group is working on two new ...

A look at Bluetooth security Bluetooth Security Review, Part 1 includes a look at social engineering - the author sits down in a food court and tries to get onto Bluetooth devices:

Look for high speed, low energy in Bluetooth products In the 11 years since the creation of the Bluetooth Special Interest Group , about 2 billion devices with the wireless technology have shipped globally. The products range from hands-free headsets to medical devices, ...

Targus Bluetooth Presenter Among the myriad uses for a laptop is giving presentations using PowerPoint or, for Mac users, Keynote. In fact, for many notebook owners, it's a primary use. Those who move around while speaking know the value of being ...

VPN security - Do you know where your keys are? Demand for mobile and remote access to small- and midsized business (SMB) networks has increased dramatically. Even the most basic VPN technologies are so accessible and affordable that there is no good reason for failing to utilize them. That said, the real question for SMBs is which type of VPN to implement: Standard IPSec or SSL?

Fight Malware on the Smartphone As more and more people bring personal technology into the workplace-most often smartphones--malicious code writers are beginning to take notice and target these weak points of entry. In its 2009 Cyber Threat Report, the Georgia Tech Information Security Center cited the possibility of botnets moving from the desktop to the smartphone within the year. A few enterprise security vendors are not waiting.

PCI council ranks security risks, milestones Businesses shouldn't let financial pressures put PCI-security compliance on the back burner, and the PCI Security Standards Council has devised has devised a 12-step program to help merchants get there.

Federated provisioning could exist Today we'll wrap up our current discussion of federated provisioning. That's easy, because there really is no such thing today. But there might be if reason prevails. Let me tell you about it.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Juniper Networks
rule

Expert advice on improving a data center
Discover how to significantly simplify your data center architecture while containing costs and improving efficiency and reliability. On March 12, data center design and implementation experts will share in-depth advice on new approaches and examples of deployments - including price, performance and savings. Register for this Live Webcast now.

rule

Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.


The Power of LAN Test Tools.
Successfully deploy a wired/wireless Ethernet network and keep it running with exceptional up-time. Ensure your network is ready for new technologies by running assessment tests that provide you with the data you need. Resolve connectivity issues and quickly address network performance complaints. Get all of the details today.
Download this whitepaper now.

 

02/26/09

Today's most-read stories:

  1. 40% of geeks surveyed really work fewer than ... say what?
  2. Juniper's answer to Cisco in the data center: Stratus Project
  3. Gmail chat invaded by phishing scam
  4. Microsoft has big growth plans even as economy limps
  5. Five fantastic open source tools for Windows admins
  6. IPhone-controlled car to demo at Geneva Motor Show
  7. VeriSign: We will support DNS security in 2011
  8. Check Point overhauls its security software
  9. 2009 Best of Tests winners
  10. Turning 5,000 discarded cell phones into art


A Simplified Data Center - Live March 12
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: