Search This Blog

Tuesday, February 10, 2009

Don't be a data loss victim; Managing security in bad times: CISOs speak out; Kaspersky Lab hacked

Disclosure laws provide a goldmine of information on the causes of data breaches and ways to avoid a costly incident
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Qualys
rule

IT Governance and Risk Management.
Keep your IT assets safe with a security strategy that can quickly respond to cyber criminals' newborn inventions. Find out how in this Executive Guide, "Guide to Governance and Risk Management: The new security reality." Successfully fight social engineering attacks and comply with federal regulations. Learn more today. Download this Executive Guide now.

rule

Spotlight Story

Don't be a data loss victim
Somebody was siphoning customer financial data from a chain of gas station/convenience stores. Read more.
Plus: 7 ways to stop data breaches The experts all say that data security goes beyond the use of technology. Nevertheless, there are numerous tools and techniques that IT professionals can use to improve their organization's stance on data security.

Related News:

Managing security in bad times: CISOs speak out IT security executives are struggling to hold onto budgets and align IT security projects with business needs amid tough cost-cutting

Kaspersky says Web hack 'should not have happened' It's the worst thing that can happen to a computer security vendor: This weekend, Moscow's Kaspersky Lab was hacked.

Time to Tweak Microsoft's Patch Tuesday? It's been about six years since Microsoft set aside the second Tuesday of each month as the day to release security patches, and most IT administrators have come to appreciate a consistent schedule to plan around.

Firms Take Steps to Head Off Encryption Dangers The growing call to encrypt stored data is raising questions among users and analysts fearful that a lost password or damaged drive could bury important information forever.

Security services in mind, StillSecure buys ProtectPoint StillSecure is looking to get into the security services business with the acquisition of ProtectPoint today.

FTC kills fraudulent online check-processing operation The Federal Trade Commission got a U.S. District Court to permanently stop what it called illegal operations of an Internet-based check creation and delivery service and required the group to give up some $535,000 in ill-gotten gains.

Your Security Game Plan How much progress is really being made in securing storage? For several years now, pundits have sounded the alarm about a range of security risks associated with storage. That includes everything from a lack of fundamental network security practices for SANs to the ever-familiar problems associated with handling off-site media. Regarding the latter, hardly a week goes by that some organization isn't reporting the loss or theft of laptops or tapes containing confidential information.

NAC questions nag at big security vendors Symantec and McAfee appear to be bumping up against a common wall when it comes to one component typically found in security software suites: Network access control.

Security problems still plague retailers' wireless LANs A large-scale scan by Motorola's AirDefense group has found that wireless LAN vulnerabilities in retailer networks though much improved over last year, are still all too common, despite repeated, widely-publicized wireless security breaches.

Kaspersky, OpenDNS collaborate to slow Conficker worm OpenDNS has added a feature to its DNS services to fight a widespread worm, with help from Russian security company Kaspersky Lab.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Qualys
rule

IT Governance and Risk Management.
Keep your IT assets safe with a security strategy that can quickly respond to cyber criminals' newborn inventions. Find out how in this Executive Guide, "Guide to Governance and Risk Management: The new security reality." Successfully fight social engineering attacks and comply with federal regulations. Learn more today. Download this Executive Guide now.

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.

 

02/10/09

Today's most-read stories:

  1. Wikileaks releases 6,780 Congressional reports
  2. Mac clone maker wins legal round against Apple
  3. Microsoft rounds out voice assault
  4. Security problems still plague retailers' wireless LANs
  5. Mommas don't let their babies grow up to be engineers
  6. Porn site feud spawns new DNS attack
  7. Top 10 spam-friendly registrars named and shamed
  8. Cisco is not ruling out layoffs
  9. Nortel still signing up customers
  10. Apple planning TV with iTunes integration and DVR capability?


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: