Search This Blog

Monday, February 28, 2011

Is VoIP too secure?

Security information and event management tools require 'fine tuning,' user says | Smartphones, devices spark IT security "mobile melee"

Network World Security

Forward this to a Friend >>>


Is VoIP too secure?
It's hard to imagine, but roughly 10 years ago as VoIP was being rolled out corporate networkers were quite concerned about the security of VoIP. As we faced a move from voice going over a traditional (and, by the way, unencrypted) network, there was concern that VoIP would be much too easy to eavesdrop on - especially if it traversed the Internet. Read More


RESOURCE COMPLIMENTS OF: Citrix XenServer

Download Free XenServer
XenServer is the only enterprise-ready, cloud-proven virtualization platform you don't have to pay for. With live migration, centralized multi-server management, and shared storage support, you can't afford not to try it! Click to continue

DOWNLOAD: Qualys Inc.

QualysGuard Security & Compliance Suite Trial
The 14-day Trial includes: • Unlimited network mapping and discovery • Unlimited network perimeter scans • PCI Compliance scanning • Web application security scanning • IT security policy creation, scanning and reporting Sign up for your free trial today! Learn more!

Security information and event management tools require 'fine tuning,' user says
Security information and event management (SIEM) equipment is valuable for getting a bird's-eye view of security in the enterprise, but there are deployment challenges that IT security managers need to recognize. Read More

Smartphones, devices spark IT security "mobile melee"
While devices such as the iPhone, iPad, Blackberry and Android are in most cases welcomed into the corporate world, there's uncertainty about how to fit them into enterprise IT security practices that have been concerned so long by Microsoft Windows. Read More

Can data stored on an SSD be secured?
Following a recent report that data on most SSDs is very difficult to completely erase, researchers and analysts say there are really only two methods to ensure sensitive data is secure once you're finished using your SSD. Read More


WEBCAST: Palo Alto Networks

Choosing Enterprise Firewall for 2011 & Beyond
Firewalls are evolving. Application visibility and control has made its way to the forefront of the requirements list for enterprise firewalls. We are dedicating this episode of 60 Minutes with Nir Zuk to the more practical considerations around choosing an enterprise firewall. Learn more!

Security hole identified in IE 9
Identity Finder CEO says Microsoft browser lacks a password for passwordsThe head of a computer security company is troubled by what he sees as a glaring security hole in Microsoft's Internet Explorer 9. Todd Feinman, CEO of Identity Finder, says IE 9 needs a master password that protects all other passwords an IE9 user would have stored in the browser. Mozilla Firefox has a "master password," but Internet Explorer doesn't. Read More

HIPAA privacy actions seen as warning
Two separate enforcement actions taken this week by the U.S. Department of Health and Human Services (HHS) for HIPAA privacy violations should serve as a warning to all health care entities, say privacy analysts. Read More

FBI: Internet crime high; types of misdeeds changing
The FBI's 10th annual Internet crime report finds that complaints an money losses are at an almost all-time high with non-delivery of payment or merchandise, scams impersonating the FBI and identity theft leading to top 10 online complaint parade. The report, which is issued through the FBI's partner, the Internet Crime Complaint Center (IC3) and the National White Collar Crime Center (NW3C) found that in 2010, IC3 received 303,809 complaints of Internet crime, the second-highest total in IC3's 10-year history. Read More


WHITE PAPER: HP

End the Communications Disconnect
The technology inefficiencies created by having multiple communications tools are a significant challenge for workers trying to collaborate better. Unified Communications (UC) is a method to meet this challenge. In this paper, Yankee Group examines UC business drivers, current deployment challenges and makes recommendations on vendor selection. Read Now

Want your own, sort of, personal submarine?
Raonhaje Ego Semi Sub can help you explore undersea worlds without all that nasty divingYou can tell by the name it's not exactly a real submarine. The Ego Compact Semi Submarine promises to offer you and a friend an unbelievable view of the undersea world but it's not actually submerging and neither running silent nor deep like real submarines of yore. Read More

Changing the status quo for security: Turn it on
Hackers have attacked the U.S. NASDAQ stock trading computers. Experts say cyber security in some large emerging world powers is almost non-existent. U.K. government e-mail is compromised. These recent headlines prove that computer security is not only not solved, it is degrading. Read More

Three-time Pwn2Own winner knocks hacking contest rules
Organizers of Pwn2Own on Sunday defended the hacking contest's rules after a three-time winner criticized the challenge for encouraging researchers to "weaponize" exploits. Read More

Apple invites bug researchers to scrutinize Lion OS
Apple is offering security experts a copy of the developer preview of Mac OS X 10.7, aka Lion, and asking them for feedback. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

When IT professionals cheat
We asked 200 IT professionals to tell us how often IT workers cheat on certification exams, buy fake gear or illegally share software. Here are the results.

Tech 'firsts' that made a President's day
From the first presidential steamboat ride to the introduction of electricity in the White House to Obama's famous BlackBerry, our nation's commanders in chief have always enjoyed the privilege of being exposed to technology's cutting edge -- even if they haven't always embraced the opportunities.


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: