Search This Blog

Friday, July 31, 2009

FTC delays identity theft rules for third time

Defense stalwarts building cybersecurity CSI; HP researchers say browser-based 'Veiled' make darknets a snap
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Sun Microsystems
rule

Identity Management: complexity made simple
Sun's pragmatic approach to identity management combats complexity with everyday solutions, helping you streamline and simplify the identity infrastructure to reduce costs, tighten security, and mitigate risk. View the Sun Identity Management Solution Center today.

rule

Spotlight Story
FTC delays identity theft rules for third time

Well this is getting kind of predictable. The Federal Trade Commission this week has delayed for the third time in less than a year the deadline for companies to enact its identity theft rules known as Red Flags, which were set to become practice Aug. 1. Read full story

Related News:

Defense stalwarts building cybersecurity CSI
Northrop Grumman has become the latest defense contractor to go whole hog into cyber threat monitoring and detection. The defense giant said it has opened cyber threat detection and response center staffed around-the-clock, providing security monitoring for more than 105,000 clients and 10,000 servers worldwide.

HP researchers say browser-based 'Veiled' make darknets a snap
Darknets – private networks carved out of the Internet to allow peer-to-peer sharing – can be quickly and easily created among Web browsers making it possible for people to participate anonymously and for the darknet itself to vanish with barely a trace when all the participants close their browsers, researchers told Black Hat yesterday.

BBN grabs cash, turns up heat on language translation technology
When it comes to translating languages in real time, BBN must speak the tongue as it netted a $14 million check from the Defense Advanced Research Projects Agency (DARPA) this week to continue developing its speech and text technology.

Open-source project aims to makes secure DNS easier
A group of developers has released open-source software that gives administrators a hand in making the Internet's addressing system less vulnerable to hackers.

Fake anti-virus programs set to rule the roost
The phenomenon of fake anti-virus (AV) software is growing at such a pace that it could grow to eclipse all other types of malicious software, one security company has suggested.

UnboundID adds proxy server to directory lineup
Directory and identity start-up UnboundID completed its directory lineup with the release of a proxy server that provides users with load balancing, failover and extra security controls.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Black Hat's best
Black HatHow well you remember the Black Hat conference's most notorious incidents?

Wireless burning questions
IT quizHow much longer are you going to hang onto that Ethernet cable? And other questions.

New Data Protection Strategies
As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to business.
Learn More


 

July 31, 2009

TOP STORIES | MOST DUGG STORIES

  1. iPhone SMS attack to be unleashed at Black Hat
  2. Mystery solved: MS emergency patch precedes Black Hat session
  3. Clampi Trojan plunders financials for botnet
  4. CERT and ISC warn about BIND9 DNS vulnerability
  5. 5 technologies Iran is using to censor the Web
  6. Microsoft-Yahoo will change cloud computing
  7. Cloud computing confusion reigns in U.S. government
  8. Black Hat's most notorious incidents
  9. What business is Cisco in today?
  10. Cisco fixes critical WLAN flaws

Polling Results: Leading IT Pros Weigh In on Top IT Issues
Accelerate your knowledge of the IT world you inhabit by viewing the results of a series of polls taken by your IT peers. These polls of 100+ IT professionals each are available for full viewing. They cover key topics such as virtualization, processor performance, green IT, cloud computing and many others.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: