Outsourcing
Giga, 9/10/02: Deciding to Outsource or Do-It-Yourself in Security Monitoring/Intrusion Detection
Michael Rasmussen
With increased focus on security, along with standards/regulations enforcing adoption, the demand for a process to monitor for security events across the enterprise has grown. To answer this need, security product vendors and managed service providers have responded with a wide range of solutions that may or may not meet your requirements. The question is — do I develop this process in-house, or do I outsource it? The answer lies in understanding how critical security monitoring is to your organization.
[more]
Microsoft
ZDNet, 9/10/02: MS buys security software specialist
By Sandeep Junnarkar
Microsoft on Tuesday announced it is acquiring XDegrees, a maker of security software, in a move to further the software giant's goal of improving Windows security.
XDegrees, a small company based in Mountain View, Calif., makes products to secure information access across computer systems installed in large companies. The company plans to relocate to Redmond, Wash. Financial terms and the number of employees involved in the deal were not disclosed.
[more]
ZDNet, 9/6/02: Why Windows makes mobility so hard
By Larry Seltzer
Have you ever tried to move a Windows notebook between two networks?
Consider a Windows domain at work and a home network using a workgroup, or perhaps two branch offices that aren't in the same domain. When you boot up a notebook in one after being in the other, there are numerous settings you have to change in order get the notebook to join the network properly--and you have to do this every time you switch.
[more]
The Register, 9/10/02: IE 6 SP1 omits fixes for 20 outstanding flaws
By John Leyden
Researchers have discovered that inadequate security restrictions in Internet Explorer make it possible for an attacker to execute script on any Web page that containing frames.
[more]
Intel
Giga, 9/9/02: LANDesk Spin-off Is Good for Customers
The primary strength of this separation will be the ability of the new company to focus all of its resources on the LANDesk suite of products. The new team, expected to be in the neighborhood of 150 strong, will no longer be operating within the confines of Intel’s operating parameters but rather as an independent entity able to focus the appropriate resources necessary to move the LANDesk product forward. It likely comes as no surprise to existing LANDesk customers that the product has languished at Intel during the last two years, offering little in the way of significant upgrades and improving its position with respect to mobile systems only through the partnership with XcelleNet.
[more]
IDG News, 9/10/02: Update IDF: Intel lays out vision of mobile lifestyle
Tom Krazit, IDG News ServiceBoston Bureau
SAN JOSE, CALIFORNIA - Users increasingly want their home, office, mobile and consumer-electronic devices to exchange multimedia content, according to Intel Corp. executives who spoke Tuesday morning at the Intel Developer Forum here. This demand is in turn driving the design of the next generation of computers, especially mobile machines such as notebook PCs and wireless handheld devices, they said.
[more]
The Wall Street Journal, 9/11/02: Intel, Verisign Team to Create ID Cards for Laptop Security
SAN JOSE, Calif. -- Intel Corp. and VeriSign Inc. said they will create digital identity cards that personal-computer makers can install on notebook computers that use Intel's forthcoming Banias processor, to help improve security for mobile-computer users.
[more]
Wiresless
ZDNet, 9/11/02: Is Wi-Fi ready to roam?
By Ben Charny
Networking groups around the globe are working on ways for Web surfers to roam on any number of wireless networks--just as mobile phone users roam on cellular networks.
The popularity of Wi-Fi--which features networking nodes that use the 802.11b wireless technology to broadcast an Internet connection over a radius of 300 feet--has spawned a number of independent companies that offer wireless services. Yet it is difficult, and prohibitively expensive, for many customers of a Wi-Fi service to use the network of another.
[more]
7:15:52 AM
|