Search This Blog

Tuesday, October 27, 2009

NIST SP800-53 Rev. 3: Key to Unified Security Across Federal Government and Private Sectors

Next-Generation Firewall Service - What are the necessary pieces here?; Microsoft wants ISO security certification for its Cloud services
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Riverbed
rule

Rapid Replication for Virtual Servers
What's the connection between virtualization and acceleration? It's deeper than you might think. See how these two hot technologies complement each other to consolidate servers, enhance DR and simplify the IT infrastructure.

Learn more.

rule

Spotlight Story
NIST SP800-53 Rev. 3: Key to Unified Security Across Federal Government and Private Sectors

Standards play a critical role in information assurance. Given the impossibility of defining a deterministic model that includes billions of users, millions of computers, and thousands of programs and protocols potentially interacting with each other unpredictably, we have to rely on human consensus about best practices if we are to progress in our field. Standards also provide a basis for demonstrating due care and diligence in fulfilling our fiduciary responsibilities to stakeholders. Read full story

Related News:

Next-Generation Firewall Service - What are the necessary pieces here?
role of next-generation firewall in tomorrow's borderless networksWell, the reality is that view that we have of anything as next-generation is a moving target. our view for that entity changes over time, largely fueled by innovation (and in some ways the service packaging).

Microsoft wants ISO security certification for its Cloud services
Microsoft Corp. wants to get its suite of hosted messaging and collaboration products certified to the ISO 27001 international information security standard, part of an effort to assure customers about the security of its cloud computing services.

Week in Security: Windows 7 a go; Steve Ballmer a pro; ChoicePoint, MoneyGram face woe
A look back at all things security for the past week:

Trend Micro bolsters virtualization security options
Trend Micro's Deep Security firewall/intrusion-protection system software for VMware's ESX server can protect multiple virtual machines on one physical server.

500,000 job hunters details exposed in Guardian hack
Sensitive personal data belonging to 500,000 job hunters have been exposed after hackers attacked The Guardian's Jobs website.

How 9-11 Shaped Hoover Dam Security Operations
The Hoover Dam is one of the great wonders of American engineering and in addition it is an important part of our nation's critical infrastructure. Here's a look at how the Bureau of Reclamation, a part of the U.S. Department of Interior, protects this national icon.

Data masking secures sensitive data in non-production environments
Sensitive data is a part of every large organization's normal business practice. Allowing sensitive data from production applications to be copied and used for development and testing environments increases the potential for theft, loss or exposure -- thus increasing the organization's risk. Data masking is emerging as a best practice for obfuscating real data so it can be safely used in non-production environments. This helps organizations meet compliance requirements for PCI, HIPAA, GLBA and other data privacy regulations.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Why SOA-based Date Services?
Data. It's your organization's most proprietary asset. Whether it's in traditional IT systems or in the internet cloud, the ability to get to it, trust it, and use it to drive effective actions is your competitive advantage.
Register for the launch of Informatica 9 today.


Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More

 

October 27, 2009

MOST-READ STORIES

  1. IT industry graveyard 2009
  2. Verizon Droid FAQ: What we know so far
  3. Yahoo shutters GeoCities
  4. Smartphone smackdown: Motorola Droid vs. iPhone 3GS
  5. Extreme Networks replaces CEO, lays off 70
  6. First look: RIM's BlackBerry Bold 9700
  7. Avalanche is top phishing gang by far this year
  8. Cisco ISR G2s - Just another 3700-series?
  9. What you should know about upgrading from XP to Win 7
  10. McCain introduces bill to block FCC's net neutrality rules

Executive Guide - Storage Virtualization
Storage virtualization isn't a no-brainer technology, and enterprise IT executives must carefully study how best to implement and manage it within their data centers. In these articles, Network World, along with its sister publications Computerworld and CIO, explore the benefits and challenges of storage virtualization.
Learn more



DEMOfall 09 People's Choice Winners: Innovations in sound and email productivity

EMO Labs' invisible speaker innovation and Liaise, Inc. productivity enhancement application take the People's Choice Award Top Honors at DEMOfall 09 Product Launch Event.
Watch both product launches.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: