Security Pipeline Newsletter www.SecurityPipeline.com Thursday, January 26, 2006 In This Issue: - Cybercrime Feared 3 Times More Than Physical Crime - Cyberstalking Law Targets E-mail, But Could Chill Bloggers - Kama Sutra Spoofs Digital Certificates - More News... - Annual Salary Survey: Where Do You Stand? - Security No Longer A Linux Deployment Hurdle - Cisco Security Alerts Serve As VoIP Wake-Up Call - More Picks... Join InformationWeek for a FREE, live TechWebCast, The Why's, How's and What's of IP based systems for the call center - A practical guide for call center operations. Still unsure about why you should move to an IP call center system? Need help determining how best to move to an IP system? Unclear about what next steps to take? Attend this webcast for practical tools and answers to these questions that will help you and your team make the right decisions moving forward. Thursday, February 23, 2006 - 11:00 AM PT / 2:00 PM ET http://www.techweb.com/webcasts/ipbasedsystems022306 ----------------------------------------- Editor's Note: Getting A Grip On Linux Security For the past two weeks I've been running a poll at Security Pipeline to find out what your take is on Linux security. Right now the numbers show that a majority believes Linux security isn't bad at all, with 36% actually going so far as to describe it as extremely secure. If you haven't voted, cast your ballot this week as there'll be a new poll up come Monday. This week also brings a great article from contributing writer Jennifer Bosavage on the topic, and how security is really no longer a legitimate hurdle in keeping Linux from being planted within enterprises. But, as she points out, having great security doesn't always mean gaining market share as the small-to-midsize business wants the security the open-source platform offers, but they don't have the manpower to keep Linux running. You might also want to check out some other good Linux security articles: Why Linux Is More Secure Than Ever A tech expert discusses open source security, past and present, and how enterprises can ensure that their Linux environment is secured. Five Linux Security Myths You Can Live Without Ignorance may be bliss, but a smoking crater where your Linux workstation once sat is not. Here are some common Linux security myths that you're better off living without. And don't miss the new TechWeb Open Source Center that pull all the good info and news you need into one place when it comes to open source computing. And finally, if you are like most IT workers, you want to know where you stand; whether your career is on track; whether you deserve a raise. You can find that out and more by participating in InformationWeek's Annual Salary Survey. Not only that, you can win prizes and you can receive a 30+ page report that compares your salary and job satisfaction responses to those of your peers.
Judy Mottl
Don't let future editions of Security Pipeline Newsletter go missing. Take a moment to add the newsletter's address to your anti-spam whitelist: secured@techwire.com If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks. Top Security News Cybercrime Feared 3 Times More Than Physical Crime Recent poll data, indicating that data breaches and identity thievery are changing consumer behavior, have been confirmed by a report released Wednesday by IBM.
Cyberstalking Law Targets E-Mail, But Could Chill Bloggers
Kama Sutra Spoofs Digital Certificates
FTC Says Cell Phone E-Mail Is Hoax
Bill Gates' Spam Prediction Misses Target
Botnet Creator Pleads Guilty, Faces 25 Years Editor's Picks Annual Salary Survey: Where Do You Stand? Do you deserve a raise? Is your career on track? The editors of InformationWeek magazine invite you to participate in our 9th annual National IT Salary Survey.
Security No Longer A Linux Deployment Hurdle
Cisco Security Alerts Serve As VoIP Wake-Up Call
Microsoft Data Collection Troubles Some Users
Security Firm Offers Ad Space In Bug Report
Microsoft Apparently Bends On Source Code Licensing Cast Your Vote Now! Given one expert's recent take on Linux security, what's your viewpoint about how secure open source technologies are today? Get More Out Of Security Pipeline Try Security Pipeline's RSS Feed Security Pipeline's content is available via RSS feed: Get RSS link. The feed is also auto-discoverable to many RSS readers from the Security Pipeline home page. Note: RSS feeds are not viewable in most Web browsers. You need an RSS reader, Web-based service, or plug-in to view RSS. Find out which RSS readers the Pipeline editors recommend.
Check Out Our Security Product Finder
Discover The Pipelines
Recommend This Newsletter To A Friend
Join InformationWeek for a FREE, live TechWebCast, The Why's, How's and What's of IP based systems for the call center - A practical guide for call center operations. Still unsure about why you should move to an IP call center system? Need help determining how best to move to an IP system? Unclear about what next steps to take? Attend this webcast for practical tools and answers to these questions that will help you and your team make the right decisions moving forward. Thursday, February 23, 2006 - 11:00 AM PT / 2:00 PM ET http://www.techweb.com/webcasts/ipbasedsystems022306 ----------------------------------------- Manage Your Newsletter Subscription We take your privacy very seriously. Please review our Privacy Policy.
Security Pipeline Newsletter
|