Friday, June 11, 2010

McAfee vs. Symantec; Check Point buys into enterprise rights management

  Check Point buys into enterprise rights management | ISPs expected to adopt new security code of practice
 
  Network World Compliance

Forward this to a Friend >>>


McAfee vs. Symantec
For decades, Symantec and McAfee have fostered a tit-for-tat rivalry that makes the old Hatfields and McCoys feud look tame by comparison. Read More


RESOURCE COMPLIMENTS OF: IBM

Try Rational AppScan
Download Today! IBM Rational® AppScan® Standard Edition is a Web application security testing tool that automates vulnerability assessments, significantly reduces costs associated with manual vulnerability testing and helps to protect against the threat of cyber-attack by automating security analysis to detect exploitable vulnerabilities. Click to continue

E-GUIDE: Compuware

Perfecting Application Performance
The enterprise application scene has become increasingly complicated over the years. Things have changed with the rise of Web services, SOA, Virtualization and cloud computing. In this Executive Guide explore how to get the best performance out of today's application environments. Read Now.

Check Point buys into enterprise rights management
Check Point Software is expanding its security portfolio to include enterprise rights management with the purchase of Liquid Machines. Read More

ISPs expected to adopt new security code of practice
The local ISP industry is expected to take up the Australian Internet Industry's (AII) new voluntary code of practice on cyber security, but some doubts over the plan have been expressed. Read More

Google's Postini has performance issues
Postini, Google's suite of e-mail security, management and archiving services, encountered service disruptions on Tuesday afternoon and evening. Read More

8 trends driving IT job growth, salaries
Will job prospects for U.S. IT professionals fare better or worse for the rest of 2010? It's hard to tell from the latest economic and employment data being released by IT career experts. Read More


WHITE PAPER: Novell

Intelligent Storage Management at the File Level
Many storage management tools for file storage are "dumb." They treat all files the same regardless of business relevance and they lack the ability to automate user-storage management tasks or set policies based on business requirements. Learn how to augment your existing storage management system with intelligence at the file level. Read Now

Socializing safely via the Internet
In my last column, I exhorted readers to contribute to integrating cyberspace into our young people's moral universe by getting out into their communities and speaking about Internet safety and other matters of interest. Read More

After Google hack, warnings pop up in SEC filings
Five months after Google was hit by hackers looking to steal its secrets, technology companies are increasingly warning their shareholders that they may be materially affected by hacking attempts designed to take valuable intellectual property. Read More

Sophos adds cloud-based threat analysis to endpoint security software
Sophos has added a cloud-based threat analysis and blocking capability called Live Protection to its endpoint software for anti-malware and intrusion-detection defense. Read More

Microsoft leaves some Office XP users patchless
For the second time in nine months, Microsoft has declined to patch a vulnerability in an older product because creating a fix was "infeasible." Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

Mobile phone security dos and don'ts
Is your enterprise security team struggling to keep up with the rapid proliferation of mobile and smart phones? Five experts offer advice to help you protect everything from the BlackBerry to the iPhone and Droid. Read More

Security vendors must eradicate 'false positives'
Symantec believes security firms should be concentrating on eradicating 'false positives' or file that are incorrectly identified as malware. Read More

'Brute force' script snatched iPad e-mail addresses
Security experts blamed a 'brute force' attack that exposed the e-mail addresses of more than 100,000 iPad owners on poorly-designed AT&T software. Read More

Should You Worry about the iPad 3G Data Leak?
Oops. AT&T has egg on its face after leaving sensitive information on 114,000 owners of the iPad 3G exposed on the Web. A group known as Goatse Security has published the personal e-mail addresses of the victims--many of whom are popular celebrities, prominent executives and high-ranking dignitaries--that it obtained by exploiting an automated script on an AT&T server. Read More

Federal security framework targets unnecessary governance
The Federal Government has formally launched its Protective Security Policy Framework in order to simplify the government security processes as part of a wider movement to improve Australia's national security. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

10 useful Firefox-based apps
Here are 10 useful desktop programs that run on the open-source Web browser's native technology. All of these applications are free for you to download and use -- and only one is a Web browser.

5 things we love/hate about cloud automation tools
Here are some things we love and some things we hate about cloud automation tools.

MOST-READ STORIES

  1. Good sign for economy: More people are quitting jobs
  2. Networking's 20 greatest arguments
  3. AT&T bug discloses iPad owners' e-mail addresses
  4. Firefox vs. Chrome vs. Internet Explorer
  5. AT&T's new data plan means companies will ditch 3G cards
  6. Google slams Apple over iPhone ad ban
  7. Apple's iPhone 4: Four worthy alternatives
  8. 'Pearl Harbor' post struck a nerve
  9. Brocade unveils unified data center strategy
  10. IT security skills in short supply
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: