Monday, November 26, 2007

Did NSA leave itself an encryption back door? Traffic growth could choke 'Net by 2010

Voices of Networking Network World logo
NetworkWorld.com | Network Management Research Center | Update Your Profile
Did NSA leave itself an encryption back door?

Paul McNamara By Paul McNamara
Is there any better indication of how far our freedoms have eroded than the frequency and vigor with which security experts question the means and motivation behind U.S. government actions purportedly intended to keep us safe? Suspicion of the government has always been natural, of course, but today it has become - quite rightfully - a defense mechanism of the first order. Read full story


SPONSORED BY SECURE COMPUTING
rule

Webinar: Securing up network access
Learn how token-based, one-time password authentication systems can help enterprises reduce business risk, better comply with regulations, are easy to manage and most importantly keep networks secure. Tune in to this webinar.

rule
RELATED NEWS:

Johnson: Traffic growth could choke 'Net by 2010, 11/19/07: One of the great things about technology is that it's surprisingly easy to underestimate how strong the demand for it can become. Remember IBM CEO Thomas Watson’s purported 1943 remark, "There's a world market for maybe 5 computers," and Bill Gates' ...

Bradner: A step in the right direction away from credit abuse, 11/20/07: I’m writing this just before Thanksgiving, and one of the many things I’m thankful for is that the major credit-reporting agencies finally understand they were a major part of the identity-theft problem.

Cool Tools: Five holiday tech gifts for under $100, 11/19/07: Check out our eighth annual Cool Yule Tools, in which our testing elves have so vigorously presented their favorite technology products and gift ideas for the 2007 holiday season. This year was more exhausting than usual, as we had to find products other than the iPhone to endorse. Luckily, we found a few.

Gearhead: ITunes remote control revisited, and posting to Drupal with Zempt, 11/19/07: Gibbs discusses some minor, undocumented problems with the Keyspan TuneView he reviewed a couple of weeks ago, then launches into the world of posting to blogs hosted on Drupal and a tool called Zempt.

Backspin: IT pornography — I know IT when I see IT, 11/19/07: The IT industry appeals to base human desires, such as greed, lust and gluttony. Thus, we are morally reprehensible and the IT industry pornographic. Business as usual, chaps.

Security Risk and Reward: Re-assessing risk (The crown jewels are almost worthless), 11/19/07: A popular expression in security circles is to equate critical company intellectual property with the crown jewels. The crown jewels are protected by many layers of security, but the truth is that they make very poor targets for theft because they ...

Nutter's Help Desk: Choosing the right VoIP phone, 11/19/07: Assuming we want a phone in each home office, what full-feature desk phone do you recommend we obtain? The vendors appear to be Cisco, Siemens and 3Com. With a virtual switch do we go for analog or digital desk phones?

Insider Threat: Beyond the firewall, 11/19/07: This year, with all of its data breaches, has certainly proved that network security is much more complex than at past times, when firewalls were viewed as premium defense collateral. What are some methods/policies I should be aware of as I look to ...


BIG THREATS IN '08
Top 5 security threats in 2008Top 5 security-menace predictions for next year.

ALL-IN-ONE FIREWALL TEST
idemandJuniper, Check Point, Cisco lead way in test of 13 UTM devices.

SPONSORED BY SECURE COMPUTING
rule

Webinar: Securing up network access
Learn how token-based, one-time password authentication systems can help enterprises reduce business risk, better comply with regulations, are easy to manage and most importantly keep networks secure. Tune in to this webinar.

rule

Join Network World's Technology Opinion Panel
Here is your chance to help shape the future of IT. You know what products and enhancements are needed, you have the insight and foresight to be out front and provide direction to Network Word and the network industry. To join the panel, complete a brief registration survey
. The panel is strictly for technology professionals to share their vision.

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

11/26/07

TODAY'S MOST-READ STORIES:

  1. AT&T calls teleworkers back to cubicle life
  2. Hackers jack Monster.com
  3. Testing all-in-one firewalls
  4. Google building 10 Gigabit Ethernet switches
  5. 2007 Cool Yule Tools Gift Guide
  6. Users give new Gmail thumbs down
  7. Mark Cuban to ISPs: Block P-to-P traffic
  8. 12 cutting-edge spam research projects
  9. Geek press can't handle a sex scandal
  10. Hackers poised for Black Friday assault

MOST POPULAR SLIDESHOW:
Top IT Turkeys of 2007


Compare Network Monitoring and Management Products

Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's newly enhanced Network Monitoring and Management Buyer's Guide.

Visit now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Voices of Networking newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: