Friday, April 17, 2009

RSA preview: Microsoft discloses ambitious security strategy; Cisco to make splash

Black Hat 'supertalk' halted due to vendor concerns
Network World logo

Daily News AM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Citrix
rule

Citrix	The Dos & Don'ts of Application Delivery
Application delivery infrastructure breaks the cycle of adding resources in a top-down approach. Forrester Consulting surveyed top CIOs to better understand their application delivery pain points and successes. Learn from your peers and read about Forrester's recommended twofold approach for streamlined application delivery.

rule

Spotlight Story

Microsoft discloses ambitious security strategy
By John Fontana
Microsoft Thursday began detailing a security strategy that will see it combine its identity management efforts with its Forefront security products built for clients, servers and the network edge. Microsoft will further dissect the plan, which uses Active Directory as its foundation, at next week's RSA Conference under the marketing banner Business Ready Security. Read full story

Plus: More early RSA news, below

Related News:

RSA Conference 2009: More early news

Cisco to make splash at RSA Conference
Look for Cisco to make some noise at next week's RSA Conference in San Francisco. The company on Monday will brief editors on Cisco's latest security doings, such as how it is matching up security with its virtualization and collaboration technologies.

HP Software bolsters application-scanning products
HP Software Wednesday updated its security products to help customers scan Web-based applications for vulnerabilities. On display at HP's booth during next week's RSA Conference in San Francisco, WebInspect 8.0, HP's Web-application scanning tool, has been upgraded to support vulnerability scans of Adobe Flash and Web 2.0 technologies.

Cloud Security Alliance formed to promote best practices
A group calling itself the Cloud Security Alliance announced its formation Tuesday, with eBay and ING as founding members. The alliance, which plans to make its first big splash at the upcoming RSA Conference, was formed to promote security best practices in a cloud computing environment.

TippingPoint offers customer filtering service
TippingPoint will announce next week a service that creates filters for its intrusion prevention gear to block potential attacks against vulnerabilities in corporations' custom Web applications.

RSA upgrades data leak prevention suite
EMC's RSA division Monday announced an upgraded version of its data-leak prevention suite, adding over twenty policy templates for recognizing personal identifiable information in countries around the world, including Spain and New Zealand.

Other news

Black Hat 'supertalk' halted due to vendor concerns
The Black Hat security conference is full of drama again in Amsterdam, with the last-minute cancellation of a presentation by a group of researchers scheduled to reveal a dangerous software vulnerability.

Time Warner Cable nixes bandwidth caps
In response to negative customer reaction, Time Warner Cable said today that it was shutting down bandwidth cap trials for its Internet services.

Comcast, Directv fines $4M for making 2 million annoying (and illegal) phone calls
The Federal Trade Commission this week chalked up two more Do Not Call rule victories as it won fines against Comcast and Directv for not only violating that rule but for re-calling consumers who specifically had told the companies not to call them again.

Podcast: Security threats: Good, bad and ugly
Zulfikar Ramzan, technical director of Symantec Security Response, breaks down key statistics from the vendor's annual Threat Report. (9:44)

SharePoint 2010 ... no more MOSS
Susan Hanley, author of the Essential SharePoint blog, finds very happy news with the announcement of SharePoint 14 -- no more MOSS acronym.

Video: Panasonic displays 'green house'
Panasonic opened its eco-ideas house showroom in Tokyo on Wednesday. The house contains much of Panasonic's latest environmental technologies and a few prototypes and the way of living that it promotes isn't too far away.

Video: Dodge Circuit: The battery-powered sports car
The Dodge Circuit runs on lithium ion batteries that produce 200 kilowatts of power.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Citrix
rule

Citrix	The Dos & Don'ts of Application Delivery
Application delivery infrastructure breaks the cycle of adding resources in a top-down approach. Forrester Consulting surveyed top CIOs to better understand their application delivery pain points and successes. Learn from your peers and read about Forrester's recommended twofold approach for streamlined application delivery.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/17/09

Today's most-read stories:

  1. Forced week off at Adobe not exactly a vacation
  2. PBX killer, Voice CAL coming to OCS in 2010
  3. Stanford's Cinder OS tightens mobile phone control
  4. Exchange 2010: Sneak peek
  5. What's the carbon footprint of spam?
  6. NASA takes Ethernet deeper into space
  7. Managing IP addresses with free tools
  8. Microsoft's Patch Tuesday filled with zero-day exploits
  9. Stealthy rootkit slides further under the radar
  10. Breakthrough enables Terabit Ethernet
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Network Management Solutions in your backyard.

Answers are as close as the IT Roadmap event in your area. You can ask questions, compare quotes, and gain a year's worth of direction in less than a day. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Qualify to attend free.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment