Dissecting the Storm Worm threat; UTM: Is it ready for prime time?

Latest security news.

Podcast: Dissecting the Storm Worm threat: Josh Corman created a bit of a stir at the recent Interop conference when he told attendees that the Storm Worm botnet seemed to be retaliating against researchers trying to probe its inner workings. In this podcast, Network World's Jason Meserve talks with Corman about the Storm worm, its repercussions and what you can do to protect yourself. (14:22)

Podcast: UTM: Is it ready for prime time?: Are there unified threat management firewalls with the chops to provide the perimeter security functions that an enterprise needs? Network World Lab Alliance member Joel Snyder talks with Network World's Christine Burns about the conclusions that can be drawn about UTM now that testing of the products is complete. (19:36)

Data loss-prevention efforts stymied by poor processes, 11/12/07: Protecting corporate data entails more than securing the perimeter; it requires that companies identify the data to be secured and explicitly define with processes how to prevent leaks. And according to a recent survey, not enough businesses do what it takes to prevent data leaks.

Data-protection vendors bolster wares, 11/12/07: Bocada, Arsenal Digital Solutions and Digisense separately announced upgraded software and services designed to help enterprises better manage and protect their data.

Indian news site dispensing malware, 11/12/07: The Web site of IndiaTimes, the online news site of the Times Group, one of India's large news and entertainment groups, exposed visitors to malware, according to an advisory Friday by ScanSafe.

Symantec makes personnel changes in Asia-Pacific, 11/09/07: Symantec's local managing director, David Sykes, and regional channel director, John Donovan, have abruptly left their posts.

Review: IBM/ISS Proventia MX5010 Multi-Function Security Gateway, 11/12/07: The Proventia MX5010 is an amazingly fast IPS that outclassed the competition when it came to detecting the attacks we threw at it.

Your secret B identity, 11/12/07: Governance, Risk and Compliance (GRC) Management is fast becoming the No. 1 topic of conversation in the enterprise identity field.

All I want for Christmas: Cisco security expert Jamey Heary reveals his security Christmas list - what's on your list?

Extending the Vista Evaluation Period: So, you need to evaluate Vista for a good long time without activating all the potential security headaches inherent with Windows Update. Author expert Chris Amaris offers you this perfect legal workaround to extend the evaluation period without activation. 

LAN switch security: What hackers know about your switches with Cisco's Christopher Paggen: Contrary to popular belief, Ethernet switches are not inherently secure. Security vulnerabilities exist all over the place. Did you know that there are vulnerabilities in the control plane protocols like STP and CDP? There are holes in the data plane protocols too. Christopher Paggen is prepared to tell you how to avoid these problems. Paggen is a technical marketing engineer for Cisco focusing on high-end firewalls. Join us for a live chat TODAY Nov. 13 from 2 p.m. to 3 p.m. EST, where you can ask him about configuring and securing switches, firewalls or anything else you want to talk about.

The Network World IT Buyer's Guides provide comprehensive, detailed information on how to select, test, buy and deploy thousands of network and IT products. The new Network World IT Buyer's Guides offer even more features than before, here's just one that's worth checking out: Wireless LAN Security

Editor's note: Starting the week of Nov. 19, subscribers to the HTML version of this newsletter will notice some enhancements to the layout that will provide you with easier and clearer access to a wider range of resources at Network World. We hope you enjoy the enhancements and we thank you for reading Network World newsletters.

Learn more about this topic

 
Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Related:

Copyright © 2007 IDG Communications, Inc.

SD-WAN buyers guide: Key questions to ask vendors (and yourself)