Latest security news.Microsoft outlines identity management roadmap, 05/25/04Microsoft Tuesday laid out the roadmap for its identity management platform, including federation services that will ship next year and eventually provide Web single sign-on features.https://www.nwfusion.com/news/2004/0525msid.html?nl Review: Breaking through IP telephony, 05/24/04In tests, Avaya and Cisco attempt to strut VoIP security stuff. https://www.nwfusion.com/reviews/2004/0524voipsecurity.html?nlWeblog: Can software patching be automated? 05/24/04There’s no argument over the need to patch software as quickly as possible to prevent exploits associated with vulnerabilities as they become known. The larger question is how speedily this can be done and whether the process in most instances can or should be automatedhttps://www.nwfusion.com/weblogs/security/005182.html?nlWeblog: Security testing exercises, 05/26/04Jeremy Wright is writing a proposed set of security excercises to help a company test its defenses. https://napps.nwfusion.com/compendium/archive/005228.html?nl Weblog: Building up your immunity, 05/24/04So we have researchers using the models of disease epidemics to make large-scale database systems more efficient. Why not study the way bodies develop immunity to disease to better protect against viruses?https://napps.nwfusion.com/compendium/archive/005186.html?nlOpinion: An open-source VPN, 05/24/04 Where can I find an open source SSL VPN package for Windows?https://www.nwfusion.com/columnists/2004/0524internet.html?nlOpinion: IPSec vs SSL VPN, 05/24/04We have more and more people traveling on business at my company, and management wants them to have access to resources on the network. I’m trying to find the best solution with the least overhead and costs.https://www.nwfusion.com/columnists/2004/0524nutter.html?nlOpinion: Rethinking e-mail management, 05/24/04With viruses and spam, e-mail server duty is costing more than you think.https://www.nwfusion.com/net.worker/columnists/2004/0524gaskin.html?nlSecure coding attracts interest, investment, 05/24/04A new product from computer security firm @stake will help developers search computer code for errors, security holes and other flaws that malicious hackers can use to break applications – and break into computers.https://www.nwfusion.com/news/2004/0524securcodin.html?nlExperts disagree about seriousness of IOS code theft, 05/24/04While the FBI and Cisco scrambled last week to recover source code stolen from the network giant, expert opinion differs about how serious a threat the incident is for corporate customers.https://www.nwfusion.com/news/2004/0524ciscoios.html?nlCore Security unwraps security-test tool, 05/24/04Core Security Technologies this week updated Core Impact, its security penetration-test tool for desktops and servers that lets customers run a series of exploits to determine how far into corporate resources a hacker could burrow.https://www.nwfusion.com/news/2004/0524core.html?nlNetwork Associates readies updated security appliances, 05/24/04Network Associates next week will make available the beta version of its WebShield line of gateway security appliances, adding filtering controls to block inbound or outbound content, and set policy based on usage groups.https://www.nwfusion.com/news/2004/0524netassoc.html?nlServGate joins forces with IBM to beef up security, 05/24/04ServGate this week will announce an alliance with IBM to offer managed security services to customers who own ServGate EdgeForce security appliances.https://www.nwfusion.com/news/2004/0524servgate.html?nlSygate’s new devices batten down net endpoints, 05/24/04Sygate this week is announcing new hardware that can discover unauthorized devices on networks and check known devices periodically to ensure they are functioning and continue to comply with security policies.https://www.nwfusion.com/news/2004/0524sygate.html?nlMicrosoft scrambling to secure Web services, 05/24/04Microsoft this week is scheduled to plug a major gap in its perimeter security software by integrating a partner’s XML filtering and acceleration technology into its firewall and caching server.https://www.nwfusion.com/news/2004/0524microsoft.html?nlDHS privacy director: We’re paying attention, 05/21/04Peter Sand, the new director of privacy technology at the U.S. Department of Homeland Security (DHS), walked into a lunch meeting with what could have been a hostile crowd and told privacy advocates the agency is working hard to make sure privacy rights are respected as the DHS fights terrorism.https://www.nwfusion.com/news/2004/0521dhspriv.html?nlMicrosoft eyeing merger of two secure e-mail specs, 05/21/04After submitting its Caller ID e-mail authentication specification to the Internet Engineering Task Force (IETF) earlier this week, Microsoft is now in detailed discussions to merge the specification with another, called Sender Policy Framework, or SPF.https://www.nwfusion.com/news/2004/0521microeyein.html?nlSpam clogs German government’s e-mail system, 05/21/04German parliamentarians and government employees experienced long delays with their e-mail delivery earlier this week, following a flood of spam that clogged the government’s e-mail system, a spokesman at the Federal Ministry of the Interior said Friday.https://www.nwfusion.com/news/2004/0521spamclogs.html?nlNewsletter: Creating the CIRT: Staffing, 05/20/04The computer incident response team may be a permanent, full-time assignment for a fixed group of experts or it may be a part-time role assigned dynamically, as conditions require. In either case, or for any of the intermediate arrangements, certain fundamentals will dictate your choice of staff members for the CIRT.https://www.nwfusion.com/newsletters/sec/2004/0517sec2.html?nlPhishing scourge prompts calls for change, 05/20/04The sentencing this week of a Texas man was a notable victory for the U.S. government in its fight against a form of online fraud known as “phishing.” However, a recent surge in such scams highlights the need for more than customer education, with some computer security experts calling for major changes in the way sensitive information is exchanged online.https://www.nwfusion.com/news/2004/0520phishscour.html?nlNewsletter: AEP launches SSL appliance for small businesses, 05/20/04AEP Systems has released a Secure Sockets Layer remote access appliance for small business offices.https://www.nwfusion.com/newsletters/vpn/2004/0517vpn2.html?nlCAN-SPAM law: Little impact so far, 05/20/04The chairman of a U.S. Senate committee called for more federal enforcement of a new anti-spam law amid reports Thursday that the amount of spam sent to U.S. consumers may be rising, not dropping, since the law went into effect in January.https://www.nwfusion.com/news/2004/0520canslaw.html?nlNewsletter: Reining in your remote workforce, 05/19/04In case you’ve been under a rock, the Sasser worm recently wreaked havoc with networks around the world – just the latest in a string of nasty worms that are challenging the normally nerves of steel in IT.https://www.nwfusion.com/newsletters/edu/2004/0517ed1.html?nlNewsletter: Potential attackers gain tools, 05/19/04What is arresting is that this toolkit takes the “script kiddie’s” job to a higher level, making a fairly straightforward task out of building a complete exploit, even if little is known about the actual attacks available for packaging. It even features a graphical user interface!https://www.nwfusion.com/newsletters/nsm/2004/0517nsm2.html?nlVia details next-generation processor core, 05/19/04Via Technologies provided a glimpse on Tuesday of features that will be offered with the company’s upcoming next-generation processor core, called Esther.https://www.nwfusion.com/news/2004/0519viadetail.html?nlSymantec snatches up anti-spam vendor, 05/19/04Symantec Wednesday signed an agreement to acquire anti-spam vendor Brightmail for $370 million to complement its lineup of gateway security software.https://www.nwfusion.com/news/2004/0519symbright.html?nlNewsletter: Setting up a certificate authority in simple terms, 05/18/04One way to secure a VPN is to issue digital certificates to handle digital signatures as an authentication method and to distribute encryption keys. But according to many users, setting up a certificate authority, even one that ships with a vendor’s VPN gear, is not always simple.https://www.nwfusion.com/newsletters/vpn/2004/0517vpn1.html?nl Related content news analysis Cisco, AWS strengthen ties between cloud-management products Combining insights from Cisco ThousandEyes and AWS into a single view can dramatically reduce problem identification and resolution time, the vendors say. By Michael Cooney Nov 28, 2023 4 mins Network Management Software Network Management Software Networking opinion Is anything useful happening in network management? Enterprises see the potential for AI to benefit network management, but progress so far is limited by AI’s ability to work with company-specific network data and the range of devices that AI can see. By Tom Nolle Nov 28, 2023 7 mins Generative AI Network Management Software brandpost Sponsored by HPE Aruba Networking SASE, security, and the future of enterprise networks By Adam Foss, VicePresident Pre-sales Consulting, HPE Aruba Networking Nov 28, 2023 4 mins SASE news AWS launches Cost Optimization Hub to help curb cloud expenses At its ongoing re:Invent 2023 conference, the cloud service provider introduced several new and free updates that are expected to help enterprises optimize their AWS costs. By Anirban Ghoshal Nov 28, 2023 3 mins Amazon re:Invent Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe