Search This Blog

Thursday, October 01, 2009

Applying the science of persuasion to security awareness

Texas governor blames Web campaign flop on hackers; New Trojan gives criminals full-service bank theft
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Fortinet
rule

Webcast: When Good Applications Go Bad
Register today to hear Andrew Jaquith, Senior Analyst at Forrester Research, and Anthony James, VP Products at Fortinet, discuss the challenges posed to enterprises by application security threats. Additionally, hear a customer testimonial on how CKE Restaurants, responsible for operating many of the USA's most popular quick-service and fast-casual dining restaurants, reduced the risk of application-borne threats.

Register now.

rule

Spotlight Story
Applying the science of persuasion to security awareness

Do you ever wonder whether all those security-awareness posters, coffee mugs, pens, mouse pads, and sandwich-bag clips are having any effect at all to improve security? Read full story

Related News:

Texas governor blames Web campaign flop on hackers
The kick-off for Texas Governor Rick Perry's 2010 re-election campaign was marred Tuesday by a Web site outage that staffers are now calling a denial-of-service attack.

New Trojan gives criminals full-service bank theft
Security experts agree that cyber-criminals are getting better, but a new Trojan takes things to a whole new level.

Report highlights Smart Grid security vulnerabilities
A cybersecurity coordination task force released a report this week that assesses various security and privacy requirements for the U.S. Smart Grid, as well as strategies needed to address them.

Two Romanians to face phishing charges in US
The U.S. Department of Justice has extradited two Romanians to the U.S., where they face charges in connection with a massive phishing scam.

Facebook warns members about rise in '419' scam
More and more fraudsters are harvesting the log-in data of Facebook members in order to impersonate them and ask their friends for money, according to the social-networking company.

The dark side of DLP
There is no doubt that technology makes us more effective, engaged and productive workers. Technology also allows for flexibility in how, when, and where people work.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

BeyondTrust PowerBroker: Root Access Risk Control for the Enterprise
Compliance efforts and security concerns have driven businesses to make substantial investments in threat control. In this paper, EMA analysts examine BeyondTrust PowerBroker, a comprehensive solution designed to close these gaps for the enterprise with provable control.
Read More


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

October 01, 2009

MOST-READ STORIES

  1. Top Microsoft execs outline 2010 challenges
  2. Cell towers that blend vs. those that offend
  3. Google Wave invite-only preview begins
  4. Windows 7: 10 things that still need fixing
  5. Cisco unveils data center blade switch
  6. Microsoft releases Security Essentials antimalware tool
  7. Verizon CTO: 'We told you so' about FiOS
  8. Rivals mock Microsoft's free security software
  9. Are femtocells poaching on wired nets?
  10. Fighting Conficker

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: