Search This Blog

Tuesday, March 31, 2009

Accreditation for IA-related Web sites

How to tell the good information-assurance sites from the bad?
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by IBM
rule

IBM Sponsored by IBM(R) Rational(R) AppScan
Failure to properly secure Web applications significantly impacts your ability to protect sensitive client and corporate data. IBM Rational AppScan is an automated scanner that monitors, identifies and helps remediate vulnerabilities. Download a free trial of AppScan and see how it can help prevent against the threat of attack.

rule

Spotlight Story
Accreditation for IA-related Web sites

M. E. Kabay By M. E. Kabay
Is there any way that a newcomer to information assurance (IA) can receive guidance on the trustworthiness of information about IA posted on the Web? How is a beginner to know whether the site is well researched or whether it should be used primarily as a source of garden fertilizer? Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Conficker on April 1st: Eve of destruction or big joke? Will the Conficker worm, set to activate April 1, do a lot of damage?

Information assurance in Beer-sheba In the Jewish tradition, we read the Torah (the Pentateuch, or the first five books of the Bible) every year, so it is a pretty familiar story for me. I often arrive at shul (synagogue, temple) early on Saturday ...

Workshop on Economics of Information Security One of the most difficult problems information-assurance managers face is integrating IA into the financial management architecture underlying modern organizations. Because of the lack of centralized, verifiable ...

Extreme weather and business continuity Does climate change have any relevance for information assurance and business continuity? My friend and colleague John Orlando, program director of the Master of Science in Business Continuity Management (MSBC) program ...

CISSP-holders save time and money toward degree Readers are aware that I've been involved with the creation and direction of the Master of Science in Information Assurance program at Norwich University since its inception in 2002. I am delighted to report that the ...

How to land a security sales engineering job Cisco Subnet blogger Jamey Heary has filled many different roles during his IT career. Find out why he thinks a security sales engineering position is the place to be right now.

Smart grid, other environmental control systems not smart about security If lengthy requirements were a measure of success, then smart grid technology is well on its way to being an anomaly in the environmental controls space. But I'm not going to try to hold my breath for that to happen.

Prevent intrusions: What to look for In the Buying Tips section of our Product Guide, find 15 questions to ask about IPS before you buy one.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by IBM
rule

IBM Sponsored by IBM(R) Rational(R) AppScan
Failure to properly secure Web applications significantly impacts your ability to protect sensitive client and corporate data. IBM Rational AppScan is an automated scanner that monitors, identifies and helps remediate vulnerabilities. Download a free trial of AppScan and see how it can help prevent against the threat of attack.

rule

The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.


Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now

 

03/31/09

Today's most-read stories:

  1. Deep computer-spying network touched 103 countries
  2. Preparing for the Pre: Palm and Sprint must get it right
  3. Seven reasons MPLS has been wildly successful
  4. April Fool's Conficker threat is likely hype
  5. Google: IPv6 is easy, not expensive
  6. CEO payday: How much tech chiefs made in '08
  7. Top 10 technology skills
  8. Nine cool geek tips I just can't function without
  9. IETF to explore new routing technique
  10. IBM layoffs incite backlash
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Complimentary DNS newsletter
Sign-up today and receive the latest DNS news and analysis. This newsletter provides deep insight into this murky area and offers ways to understand and mitigate risk with better management and control of your domain, email and DNS.
Sign up now at



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: