Search This Blog

Thursday, June 25, 2009

Subtle pressures for security policy compliance

High profile Twitter hack spreads porn Trojan; E-Mail Crooks Target Webmail Accounts
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by Blue Coat Systems
rule

Control is Yours.
Blue Coat provides a market-leading Application Delivery Network Infrastructure that optimizes and secures the flow of information to any user, anywhere, on any network. You'll now have something only Blue Coat can offer, business intelligence and control.

rule

Spotlight Story
Subtle pressures for security policy compliance

Information security officers and managers are constantly looking for ways to encourage colleagues to comply with security policies. The paper "Social Psychology and INFOSEC: Psycho-Social Factors in the Implementation of Information Security Policy" summarizes a number of principles from social psychology that can help practitioners in our work. Read full story

Related News:

High profile Twitter hack spreads porn Trojan
Former Apple Macintosh evangelist Guy Kawasaki [cq] posts Twitter messages about a lot of different thing, but the message he put up on Tuesday afternoon was really out of character.

E-Mail Crooks Target Webmail Accounts
Imagine having to explain an e-mail message that asks your friends for money--a message sent from your Webmail account. (Webmail refers to any e-mail service you use via a Web browser rather than through an e-mail client.) That's exactly what's happening: Scammers are breaking into such ac­­counts and, from those addresses, sending e-mail messages to the victims' entire contact list. The messages often tout a Web site (such as an e-commerce site), or even ask for money directly.

Abrupt closure of airport fast-lane program sparks concern over customer data
A company that collected detailed personal information including biometric data on 260,000 individuals as part of a registered air traveler program it operated has abruptly gone out of business, leaving many customers wondering about the safety and privacy of their personal data.

June Giveaways
Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.

Network World on Twitter? You bet we are


VMware's vSphere reviewed
vSphereWe found 5 things to love and 5 things to hate about VMware's vSphere.

Take the quiz
IT quizAre you a net know-it-all? Prove it.

Next-Generation Data Centers
IT transformation begins at the data center, as enterprises embrace technologies such as virtualization and cloud computing to build adaptable, flexible and highly efficient infrastructures capable of handling today's business demands.
Next-Generation Data Centers


 

June 25, 2009

TOP STORIES | MOST DUGG STORIES

  1. Avaya reportedly offering $500M for Nortel enterprise biz
  2. iPhone attracted customers away from BlackBerry devices
  3. Nortel had little choice but to liquidate, analysts say
  4. Busting the nine myths of cloud computing
  5. HTC puts new face on latest Google Android phone, Hero
  6. Can you manage an iPhone like a BlackBerry?
  7. Cisco rival Nortel liquidating assets
  8. Google grabs 1 million phone numbers for Google Voice
  9. Technology from the feds
  10. New Internet2 CTO pushes multicast, IPv6

Keep Pace with Sophisticated Mobile Devices
Live AirMagnet Webinar: June 25, 2009 - Learn about the impact of the latest generation of mobile devices to the security of your enterprise network. With the explosion of sophisticated Smartphones and powerful Netbooks, IT and security managers are faced with an unprecedented wave of devices that can potentially have a negative impact on security and performance of the enterprise wireless LAN.
Register now!



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: