Black Hat set to target Vista, NAC

Here is this week's Editors' Choice; look for Readers' Choice later this week.

EDITORS' CHOICE

From the Front Page

Black Hat Conference puts spotlight on NAC, Vista and rootkits

The annual Black Hat Conference, which opens July 29 at Caesar’s Palace in Las Vegas, brings together security researchers and vendors in a freewheeling atmosphere aimed at laying bare the risks and vulnerabilities in IT products.

The challenge in selling security

CSOs acknowledge facing a challenge in getting their ideas accepted from the board level on down. This is despite a general recognition by organizations today that better security and risk management are needed to protect company data.

Working on mainframes not just for old fogies

Kristine Harper was a high school senior when she took her first mainframe class. Six years later she's a professional mainframe programmer and platform evangelist to young people beginning their IT careers.

In depth

Technology Update: Ternary sorting aims to stop false positives

In the quest to block spam and phishing attempts, legitimate messages often end up collateral damage. Tune your spam filters up and you indeed reduce the amount of spam delivered — but you do so at the cost of false positives. Tune filters down and users are overwhelmed with spam, phishes and malware.

Management Strategies: Where the IT jobs are

The strongest IT hiring activity this quarter is to take place in the Mountain States — Arizona, Colorado, Idaho, Montana, Nevada, New Mexico, Utah and Wyoming — according to a third-quarter forecast from Robert Half Technology.

Tests/Buyer's Guides

SLES 10 server provides virtualization, availability

Novell's latest cut of SUSE Linux Enterprise Server offers a cocktail of new features that should be appealing to enterprise customers and service providers, provided they can steer around the few problems we found during our testing.

Sourcefire, Tenable seek vulnerabilities passively

What's on your network? Sourcefire's Realtime Network Awareness and Tenable's Passive Vulnerability Scanner attempt to answer that question without leaving muddy footprints all over the network. Both use a technique called passive network analysis to listen to traffic as it flows by.

Windows' SMB bundle offers few new upgrade enticements

While Microsoft may be aiming to rope in the 8 million small businesses that stand without a networked server with the R2 version of its Small Business Server 2003, our testing shows that although the base product is still as solid as when it was released three years ago, the few additions in the new release won't attract many new customers or entice existing users to upgrade.

From the blogs

James Gaskin looks at Microsoft's plans to innovate (by checkbook?); The Alpha Doggs lament the loss of R&D labs; Keith Shaw's Cool Tools blog features new desktops based on Intel's Core Duo 2 processor as well as new pre-N wireless gear from Linksys; and Linda Musthaler says $30 worth of software could have protected two teen runaways.

Audio/ITVideo

How is Trapeze Networks different than Aruba and can it compete with the 800-pound gorilla that is Cisco in the wireless LAN space? Jim Vogt, CEO of Trapeze, lays out the case for his company's success on this week's Network World Hot Seat.

Correspondent Martyn Williams looks at a cool new Sharp phone debuting in Japan as well as WiMax trials happening in Seoul.

Podcast: Twisted Pair

Keith and Jason discuss: a rash of cell phone-related crimes; big time acquisitions involving HP, Mercury Interactive, AMD and ATI; Yahoo and Symantec team on PC security; and working vacations.

Q&A with Cisco's Cliff Metzler

Network World Senior Editor Denise Dubie talks with Cliff Metzler, senior vice president of Cisco's Network Management Technology Group, about the company's latest initiatives for better managing your network.

Can't get enough news?

Check out our new weekly audio podcast Network World 360, where Jeff Caruso relays the top news of the week and talks to reporters for the story behind the story.

How to

Nutter's Help Desk: Getting Tivo to work with WPA

I am doing a friend a favor, setting up her Tivo box, Dell wireless laptop and Netgear WGT624 Firewall Router. All of these are up to date via wire connection, then moved on to wireless connection. The Tivo folks won't support WPA and I have been forced to downgrade to WEP. I know I want 128 bit encryption (it's better than wide open in an apartment complex) but I hit a snag.

More news

Vendors push new way to build convergence

Vendors push new way to build converged IP networks.

IronPort adds bounce-back verification for e-mail

IronPort Systems has added bounce-back-verification technology to its e-mail security appliances to protect corporations against spam-based denial-of-service attacks that rely on large volumes of bounce-back messages.

AT&T adds VPLS service to more cities

AT&T this week is expected to bring its virtual private LAN service to 23 more cities.

Microsoft touts new era of software, services

Microsoft last week indicated it is entering a new era that will be marked less by monolithic programs licensed to corporate users and more by the integration of client and server software with Internet-based services.

EqualLogic storage array has SAN partitioning

EqualLogic's new iSCSI storage array is the company's highest-capacity system, but its most significant aspect is its enhanced technology for managing data across arrays.

Happy birthday, SOX

July 30 marks the four-year anniversary of the signing of the Sarbanes-Oxley Act.

HP's software stock rises with Mercury buyout

HP has been snapping up software companies for the past couple of years, but its plans to acquire application-management specialist Mercury Interactive should give the system vendor the boost it needs to convince customers it is serious about software, analysts say.

Q&A: VMware eyes 'real' utility computing

VMware created the market for virtualizing x86-based servers when it introduced products in 2001. But the company, which EMC acquired in 2003, is no longer the only game in town. In recent years, competitors — including Microsoft and the open source Xen virtualization technology — have emerged as viable options for enterprises looking to slice and dice industry-standard servers. Network World Senior Editor Jennifer Mears spoke with VMware President Diane Greene recently to find out where VMware is heading.

CMDBs reduce costs, automate tasks

Network executives who want to resolve problems more quickly, manage the life cycle of software and hardware assets, and adopt IT governance best practices have probably talked about implementing a configuration management database.

Washington state: Who needs VoIP?

Sometimes Plain Old Telephone Service is Plain Old Cheaper Service. That's what Washington state discovered when it solicited bids for a new call center system to support social services for its citizens.

Verizon, others offer IMS extensions: Now comes the hard part for A-IMS

Now that a group of wireless vendors, led by customer Verizon Wireless, have proposed extensions to an evolving industry specification for converging IP-based wireline and wireless services, the hard part will be in garnering further support for their work.

Pitney Bowes’ advanced security system reaps returns

You have to learn to walk before you can run. That’s what Pitney Bowes discovered as it developed a unique security system designed to lock down access to its global network.

The true cost of telework

Do you know what you’re spending on IT resources to support teleworkers? If not, you’re not alone.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2006 IDG Communications, Inc.