Search This Blog

Tuesday, October 27, 2009

Next-Generation Firewall Service - What are the necessary pieces here?

500,000 job hunters details exposed in Guardian hack; How 9-11 Shaped Hoover Dam Security Operations
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by 3COM
rule

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.

Learn more

rule

Spotlight Story
Next-Generation Firewall Service - What are the necessary pieces here?

role of next-generation firewall in tomorrow's borderless networksWell, the reality is that view that we have of anything as next-generation is a moving target. our view for that entity changes over time, largely fueled by innovation (and in some ways the service packaging). Read full story

Related News:

500,000 job hunters details exposed in Guardian hack
Sensitive personal data belonging to 500,000 job hunters have been exposed after hackers attacked The Guardian's Jobs website.

How 9-11 Shaped Hoover Dam Security Operations
The Hoover Dam is one of the great wonders of American engineering and in addition it is an important part of our nation's critical infrastructure. Here's a look at how the Bureau of Reclamation, a part of the U.S. Department of Interior, protects this national icon.

Government: Come hack our data
This week the Federal Government will open its data to web developers during its first hack day.

Former federal worker sentenced for passport snooping
A former employee at the U.S. Department of State was sentenced to 12 months of probation Friday for illegally accessing more than 75 confidential passport application files, the U.S. Department of Justice said.

Ruminations on the Intersection of Inner Space & Cyber Space
For decades, cyber technologies brought forth from human genius have been radically transforming our society. Business, government, science and culture have changed swiftly and dramatically. Consequently, for decades, our collective psyche has been trying to work out its intense and complex relationship with these powerful cyber technologies. Just as Godzilla (1954), and its spin-offs, reflected the collective psyche's attempts to come to grips with grief over Hiroshima and Nagasaki, and anxieties over the threat of global nuclear war; the human race's unconscious fears and doubts about cyberspace have been projected on to the big screen in numerous sci-fi epics, notably:

Bugs and Fixes: Stymie Malicious Media, Attacks
Essential OS fixes are big this month. And fans of free software need to update their Firefox and OpenOffice copies.

Are Flash Cookies Devouring Your Privacy?
Even if you delete normal tracking cookies regularly to evade tracking by snooping sites and eager advertisers, little-known Flash cookies may be making an end run around your attempts to preserve your privacy.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Executive Guide - Storage Virtualization
Storage virtualization isn't a no-brainer technology, and enterprise IT executives must carefully study how best to implement and manage it within their data centers. In these articles, Network World, along with its sister publications Computerworld and CIO, explore the benefits and challenges of storage virtualization.
Learn more


Protecting Your Intellectual Property
Learn about the growing threat of insider data theft, the extent to which most companies are vulnerable, and how McAfee security products enable businesses to protect their most valuable asset-their data.
Click here.

 

October 27, 2009

MOST-READ STORIES

  1. IT industry graveyard 2009
  2. Verizon Droid FAQ: What we know so far
  3. Yahoo shutters GeoCities
  4. Smartphone smackdown: Motorola Droid vs. iPhone 3GS
  5. Extreme Networks replaces CEO, lays off 70
  6. First look: RIM's BlackBerry Bold 9700
  7. Avalanche is top phishing gang by far this year
  8. Cisco ISR G2s - Just another 3700-series?
  9. What you should know about upgrading from XP to Win 7
  10. McCain introduces bill to block FCC's net neutrality rules

Laptop Security Redefined
A laptop for "the whole team," that's what Lenovo created with the new ThinkPad T400. It takes thin and light to a new level, but even more compelling; it creates a new standard for laptop security. Lenovo provides manageability to remotely manage PCs for the diagnosis, isolation and healing of threats even when the PC is powered down. There's also a "poison pill" to deactivate a stolen notebook even if it's off the network.
Learn more.



DEMOfall 09 People's Choice Winners: Innovations in sound and email productivity

EMO Labs' invisible speaker innovation and Liaise, Inc. productivity enhancement application take the People's Choice Award Top Honors at DEMOfall 09 Product Launch Event.
Watch both product launches.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: