Search This Blog

Monday, February 02, 2009

Data-breach costs rising; 7 dirty secrets of the security industry; Virtual networking in a DMZ

Network World logo

Daily News PM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Infoblox
rule

Take Control of Network TCO by Automating IPAM
Growing networks are in a vicious circle of rising costs, increasing downtime, and rising staff stress. Join Enterprise Strategy Group's Jon Oltsik, for this information-packed webinar on how enterprises can reduce stress and operational expenses by automating IPAM, listen today.

rule

Spotlight Story
Data-breach costs rising, study finds

Ellen Messmer By Ellen Messmer
Data-breach impact's costs are rising, according to the Ponemon Institute's "2008 Annual Study: Cost of a Data Breach," which found the total cost of a reported incident rose to $6.6 million per reported breach, up from $6.3 million last year. Read full story

Related News:

IT Asked and Answered

Ron Nutter helps a paraplegic IT pro figure out his next steps in getting a job.

Network World Community

Edward Haletky details how to set up virtual networking in a DMZ. Keatron Evans says it's time to get back to security basics.

Michael Morris begins a discussion of his company's new Cisco-based data center. Scott Hogg looks at IPv6 in Cisco IPS ver. 6.2. Avner Izhar explains important CLI info for gauging the health of your network. Dennis Hartmann looks at signalling in QoS application classes.

Brandon Carroll explains getting started with CCNA wireless certification. Wendell Odom translates the theory and practice of OSPF.

Jeff Doyle ponders how to explain IT stuff to CFOs.

Susan Hanley discusses her journey through Dell customer support.

Randy Muller discusses getting certified for Office Communication Server 2007 R2. Brian Egler lists ten top SQL Server 2008 features. Mitchell Ashley wonders if Windows 7 will turn the tide toward 64-bit computing. Glenn Weadock, though, wonders if Windows 7 is another Vista.

Jason Meserve considers what cloud providers could learn from the stupid way Flickr terminates accounts.

John Brandon asks: Google versus Yahoo: Who will win?

In depth

The 7 dirty secrets of the security industry
Do you ever get the feeling your security providers are failing to tell you the whole truth? We entrust the industry to protect us from unacceptable risk. But we must confront the underlying truth: The goal of the security market is to make money.

More news

Get ready for high-def voice
High-definition voice -- a rarity in today's business networks -- is becoming more common, so it makes sense for corporate telephony executives to figure out now how they will make the transition, experts say.

State's plan to reprogram huge spectrum asset faces challenges
South Carolina wants to repurpose a big chunk of long-dormant spectrum, enough to offer high-bandwidth broadband services from border to border. But the plan faces challenges in the economy, the legislature, and broadband advocates.

With economic slump, concerns rise over data theft
Is the worsening economic situation going to turn some employees into data thieves?

IT pay takes a hit
Pay for noncertified IT skills, which has been consistently on the rise since mid-2004, began to decline in the last quarter of 2008, research shows.

Disk-drive encryption gets boost from Opal standards effort
The Opal industry-standards effort unveiled this week by the Trusted Computing Group should prove a boon to information technology professionals exploring desktop encryption options.

Start-up VMOps aims to ease cloud deployments
VMOps' cloud-computing infrastructure stack, built to be like "EC2 in a box," includes a hardened version of the Xen hypervisor plus storage and network virtualization.

Venture investments plummet for seed-phase network startups
Investors gave $27 million to startup and seed companies in the networking space in Q4 2008, a fraction of previous investment levels.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Data gone missing
10 woeful tales of data gone missing10 woeful tales involving backup tapes: some current, some classic and one just plain unusual.

Sponsored by Infoblox
rule

Take Control of Network TCO by Automating IPAM
Growing networks are in a vicious circle of rising costs, increasing downtime, and rising staff stress. Join Enterprise Strategy Group's Jon Oltsik, for this information-packed webinar on how enterprises can reduce stress and operational expenses by automating IPAM, listen today.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.

 

02/02/09

Today's most-read stories:

  1. Wi-Fi hot spot horrors
  2. NFL's IT chief gears up for his 25th Super Bowl
  3. Windows 7 will not sway XP users
  4. Top 10 worst uses for Windows
  5. Human error caused Google search bug
  6. Ex-Fannie Mae employee accused of planting computer time bomb
  7. Satyam claims 15 contracts signed in January
  8. Wi-Fi vs. prepaid 3G data dongles
  9. Verizon clips VoiceWing, releases wireline VoIP service
  10. Don't fear the penguin: A newbie's guide to Linux


Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: