Search This Blog

Tuesday, August 11, 2009

Case studies in working with law enforcement (part 2)

When Rogue IT Staffers Attack: 8 Organizations That Got Burned; Cybersecurity: Curiouser and curiouser
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile


Sponsored by Certeon
rule

Global Media on Virtualization
In this whitepaper learn why Global Media Company has made a strategic decision to embrace a virtualization strategy and has made a significant investment in WAN acceleration for SharePoint, Microsoft's enterprise content management (ECM) and collaboration technology. See how Certeon's aCelera virtual appliance for WAN acceleration and optimization can save you 60% in capital and operations TCO over proprietary hardware solutions, while reducing your application response time to remote users by 95%.

rule

Spotlight Story
Case studies in working with law enforcement (part 2)

He describes the practical benefits of a very public campaign of open cooperation with law enforcement that he instituted at a credit union when he was hired to improve security. Read full story

Related News:

When Rogue IT Staffers Attack: 8 Organizations That Got Burned
Eight real-world examples of the insider threat.

Cybersecurity: Curiouser and curiouser
Gibbs is an aficionado of Carrol's Alice and finds a curious parallel between the administration's cybersecurity office and believing six impossible things.

Police, councils spy on your calls, SMS and email
Official figures have revealed that in Britain each day last year, local authorities, police and the intelligence services had granted more than 1,500 requests to snoop on the public's phonecalls, emails and text messages.

Verizon Business to Offer Risk-Based Security Service
Verizon Business announced on Wednesday a new risk-based suite of security tools that include cloud-and-premises-based services. Verizon's Next Generation Managed Security Services Platform is designed to compete with similar offerings from ArcSight and RSA.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Black Hat's best
Black HatHow well you remember the Black Hat conference's most notorious incidents?

Wireless burning questions
IT quizHow much longer are you going to hang onto that Ethernet cable? And other questions.

Data in Action: Effective data management for smarter outcomes
Date: August 19, 2009 Exhibit Zone 8:00 am PDT / 11:00 am EDT to 12:00 pm PDT / 3:00pm EDT Join us for a special, complimentary Virtual Conference, offering valuable information for lowering IT costs through industry-leading performance, enhanced storage compression and improved automation.
Data in Action: Effective data management for smarter outcomes


Optimizing the Data Center
The Editors of Network World present this Executive Guide: Taking Virtualization Up a Notch. Read it and find out what you need to know about virtualization as it creeps into every corner of your data center.
Learn more

 

August 11, 2009

TOP STORIES | MOST DUGG STORIES

  1. Cyber attackers empty business accounts in minutes
  2. Five ways to get affordable certification skills
  3. Windows president tries to calm fears of Win 7 critical bug
  4. Apple's mysterious iProd gets an upgrade
  5. Critical Windows 7 bug risks derailing product launch
  6. Twitter goes down under DoS attack
  7. How virtualization is changing the way we build networks
  8. Top 10 iPhone annoyances (and how to fix them)
  9. Cisco outage due to human error
  10. Build an inexpensive, high-performance PC for Win7

Beyond ROI Calculators: Real-World Security Savings
See how WatchGuard's security solutions could have saved two organizations millions if in place prior to the headline-making cyber attacks both experienced. These solutions could have mitigated or prevented the breaches entirely. Get the facts and realize how to effectively address your real-world security problems today.
Learn more now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: