The long view
Planning and strategies for long-term NAC needs.
News | Newsletters | Podcasts | Chats | Opinions | RSS Feeds | This Week In Print | IT Careers | Community | Reports | Downloads | Slideshows | New Data Center
Partner Sites:App Performance | On Demand Security | Networking Solution | SOA | Value of WDS
Two U.S. Congressmen accused China of hacking their office computers, possibly compromising information on Chinese dissidents.
Related:A British hacker fighting extradition to the U.S. on computer hacking charges is preparing for his...
The U.S. Federal Bureau of Investigation warned Friday that online scammers are now targeting...
Over 10 Nigerian banks and Interswitch, an electronic transaction switching and payment processing...
Joel Dubin has just sent me the update of his useful guide to computer security, The Little Black...
In considering NAC, businesses should look at how they will need the technology long-term and plan...
Two U.S. Congressmen on Wednesday accused China of hacking their office computers, possibly... ...22
Japanese and French government ministers agreed on Thursday to work more closely on cybercrime.
Big week with 10 new fixes from Microsoft, including an interesting one to the company's Bluetooth...
Swedish startup Twingly is going public with its blog search-engine, which is being built to... ...1
A U.S. hacker who hooked up a botnet within Newell Rubbermaid's corporate network was sentenced to...
A Texas company that offered supposedly free software on CDs, but then billed customers for a... ...1
A large medical-grade gas firm is installing intrusion-prevention systems to circumvent security...
U.S. border agents should not be able to search travelers' laptops without a reasonable suspicion... ...5
U.S. House of Representatives members who worry that China may have been responsible for attacks on... ...3
I want to add just a bit more on orphan accounts and de-provisioning before we move on to the next...
Would you leave work over lack of Facebook access? According to a recent survey, 39 percent of 18-to-24-year-olds would quit if a Facebook ban were imposed. Because why would want to work when you have "friends" to appease?
View articleCommentArbor Networks Security to the Core blog is reporting an uptick in scanning on to TCP ports used by a daemon in HP's StorageWorks system. An exploit for a flaw in the daemon was posted to the Metasploit project a few days ago, resulting in attackers looking for target systems.
View articleCommentThe Washington Post reports on a Georgia nuclear plant that shutdown for 48 hours after a tech installed a new piece of software that caused problems with plant control systems.
View articleCommentF-Secure looks at a tool for creating PDF documents with backdoor malicious code are created and details how they came about getting a copy of the tool.
View articleComment
Like the legendary period in English history there once was a company, whose product, Hark! , promised a new way to enforce the rule of law. But instead of chivalry it was access control policies that Camelot the company promised. For all the lovely talk about access control emanating from... 1

If you haven't guessed already, it's a scam. 419 Scammers have turned to text messaging as their next fraud-inducing...
Joel Dubin has just sent me the update of his useful guide to computer security, The Little Black Book of Computer Security....
In considering NAC, businesses should look at how they will need the technology long-term and plan accordingly, Gartner...

When I saw this article, I just had to comment. From my experiences, CA has always left a bad taste in my mouth. I think...

Assessment of corporate security is a difficult but essential task. Regardless of industry, most companies allocate their...
What is the right balance between security and privacy? This is a common starting point in many policy discussions,...
In this month's piece, John Arnold, chief security architect at Capgemini UK, discusses the Jericho Forum's concepts...
Network change is constant. New technologies and applications require infrastructure changes and affect performance. In this constant state of change, you need to deliver a high level of network performance and quickly solve problems. In this white paper, you'll learn how to plan for new application deployment, manage against internal security threats, diagnose network problems, prove it's not the network, and analyze application problems.

Protecting IT networks used to be a straightforward case of encircling computers and servers with a...
Gartner MarketScope for Network Access Control, 2008 brought to you by SophosAbout half of the vendors in the network access control market are startup companies, most of which...
How to beat blade server heatBlade servers aren't just hot as in "popular." They're also hot literally. When densely packed into...

We have so many holes punched in our firewalls today that many industry insiders question the value...
Taking Virtualization Up a NotchVirtualization benefits are well known, but as virtualization creeps into every corner of your data...
Identity Management Executive GuideDiscover the latest identity management trends in this Executive Guide that's chock-full of useful...

Though small in size, remote offices face many of the same IT challenges as larger central offices....
Lowering the Cost of Email ArchivesFind out how you can support a high performance and reliable e-mail system by using a robust and...
Best Practices for Deploying WAN Optimization for Disaster RecoverySenior Analysts at ESG talk with Silver Peak's CTO, David Hughes, about recommendations for...

Register to receive your free copy of MessageLabs� anti-spam and anti-virus software to protect your company against all email threats.
Find out what drives cyber criminals and how to stop them in there tracks with robust anti-spam tools in this whitepaper.
Discover how to avoid the pitfalls of traditional anti-spam efforts and get into the mind of a spammer.