Thursday, September 01, 2005

Today's News: Dealing with disasters

SearchSecurity.com: Security Wire Daily
Breaking security news, the latest industry developments and trends
September 01, 2005
___________________________________

ISSUE SPONSORED BY: Improving Business Efficiency -- IDC White Paper

.....................................................................

IN THIS ISSUE

-- FEATURE: Disaster preparedness: Staying up while everything else
is down
-- NEWS: Network safety relies on reaction time to Patch Tuesday
-- BLOG: Mad as Hell XIV -- The ugly about 'The Move'
-- SURVEY: How bad is spyware?
-- ASK THE EXPERT: Storing hashed, encrypted values in a database
-- TOP 10 SECURITY BOOKS: What's on your bookshelf?

HEADLINES
---------------------------------------------------------------------

FEATURE: DISASTER PREPAREDNESS: STAYING UP WHILE EVERYTHING ELSE IS
DOWN
A survivor of the Sept. 11 terrorist attacks offers hard-earned
advice to those small businesses hit by disasters like Hurricane
Katrina.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1121285,00.html?track=NL-102&ad=526871

MORE INFO:

How to survive a hurricane
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1109352,00.html?track=NL-102&ad=526871&bucket=NEWS

10 steps to a successful business impact analysis
http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci1083250,00.html?track=NL-102&ad=526871&bucket=ETA

::::::::::::::::::::::::::::: SPONSOR :::::::::::::::::::::::::::::::

Improving Business Efficiency -- IDC White Paper

As regulatory laws such as Sarbanes-Oxley, HIPAA, and GLBA take
effect, the need for compliance is vital. Download this new white
paper as Charles Kolodgy of IDC illustrates how you can simplify,
automate and reduce the cost of achieving IT security and regulatory
compliance. Understand the different cost reduction strategies and
solutions that can respond to your business' compliance challenges
today.
Click here:
http://ad.doubleclick.net/adi/ssec/em;pos=2;emc=39;gci=526871;sz=1x1;ptile=2;ord=302360525?tt=1

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

NEWS: NETWORK SAFETY RELIES ON REACTION TIME TO PATCH TUESDAY |
SearchWin2000.com
Taking a wait-and-see approach before installing updates on Patch
Tuesdays can leave your company vulnerable to attacks, thanks to
zero-day exploits. Take some steps to ensure that your network assets
have defense in depth.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1121318,00.html?track=NL-102&ad=526871

BLOG: MAD AS HELL XIV -- THE UGLY ABOUT 'THE MOVE'
As he nears the end of his experiment, or at least writing about it,
Winn Schwartau, our "Mad as Hell" series author warns it's hard for
old habits to die when switching operating systems.
http://searchsecurity.techtarget.com/columnItem/0,294698,sid14_gci1120699,00.html?track=NL-102&ad=526871

ALSO ON SEARCHSECURITY.COM
---------------------------------------------------------------------

SURVEY: HOW BAD IS SPYWARE?
This is your chance to tell us! Take a few minutes to complete our
news editors' survey on the impact that spyware is having on your
organization. Responses will be part of an upcoming series of
articles on SearchSecurity.com.
http://www.insightexpress.com/s/Spyw90681

ASK THE EXPERT: STORING HASHED, ENCRYPTED VALUES IN A DATABASE
A SearchSecurity.com member asks our application expert, "Which is
better, storing hashed or encrypted values in a database?" Read the
response or pose your own question.
http://searchsecurity.techtarget.com/ateQuestionNResponse/0,289625,sid14_gci1113062_tax301707,00.html?track=NL-102&ad=526871
Pose your own question:
http://searchsecurity.techtarget.com/ateQuestion/0,289624,sid14_tax301707,00.html?track=NL-102&ad=526871

TOP 10 SECURITY BOOKS: WHAT'S ON YOUR BOOKSHELF?
We're compiling the top 10 security books for our virtual bookshelf.
Share your favorite titles and we'll add them to our list. Send an
e-mail to mailto:cferraro@techtarget.com.
http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1066220,00.html?track=NL-102&ad=526871

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

CONTACT US:

Sales
For sales inquiries, please contact us at:
mailto:gderussy@techtarget.com

Editorial
For feedback about any of our articles or to send us your article
ideas, please contact us at:
mailto:cferraro@techtarget.com


---------------------- FREE E-NEWSLETTERS! ----------------------
SearchSecurity: Threat Monitor
SearchSecurity: Updates on new site content
SearchSecurity: Network Security Tactics

Click here to subscribe:
http://searchSecurity.techtarget.com/tieredRegPage?track=NL-102&ad=526871&val=0&newsletters=1071165&newsletters=796249&newsletters=796243&email=pet.computter@gmail.com

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

ABOUT THIS E-NEWSLETTER

This e-newsletter is published by SearchSecurity.com, a targeted Web
site from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and
conferences for enterprise IT professionals.
Copyright 2005 TechTarget. All rights reserved.

_____________________________________________________________________

To unsubscribe from "Security Wire Daily":

Go to unsubscribe: http://SearchSecurity.com/u?em=pet.computter%40gmail.com&uid=3058509&cid=526871&track=NL-102

Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.

Contact us:
SearchSecurity
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494