Search This Blog

Wednesday, February 24, 2010

FTC P2P data leak alarm could give law-makers big stick

Fighting the Dark Side: Tech's Heroes and Villains | Attackers going after end users rather than servers

Network World Security Alert

Forward this to a Friend >>>


FTC P2P data leak alarm could give law-makers big stick
The FTC said companies and institutions of all sizes are vulnerable to serious P2P-related breaches, placing consumers' sensitive information such as health-related information, financial records, and drivers' license and social security numbers at risk for identity theft. Read More


WHITE PAPER: Riverbed

WAN Optimization Can Multiply IT Efficiencies
Data center consolidation, regulatory compliance and a more distributed environment are some of the IT initiatives making a comprehensive and robust disaster recovery plan more important than ever before. The Enterprise Strategy Group highlights trends in DR, the role of virtualization and the impact of WAN optimization. Learn more.

WHITE PAPER: BeyondTrust

Building a Secure and Compliant Windows Desktop
While removing administrator rights from end users may be the Holy Grail of desktop security, doing so can have an impact on what end users need to do their jobs. Read this white paper to discover powerful strategies to effectively remove administrator rights and improve desktop security. Read Now

Fighting the Dark Side: Tech's Heroes and Villains
The hero and the villain. It's the age-old formula that pervades today's reality TV showdowns, the shenanigans of professional wrestling and cinematic classics like Star Wars. Tech is no different, with its passionate heroes who balance profit with innovation and social responsibility, and the money-mad, egomaniac villains who simply cannot be trusted. Here's a look at tech's good guys and bad guys Read More

Attackers going after end users rather than servers
The Web traffic study also finds issues with botnets, corporate policies, and outdated browsers Read More


E-BOOK: Sybase

5 Key Mobile Management Must-Dos
Discover the five steps you can take to realize comprehensive management of your mobile environment. This IDG Playbook will guide your strategy for managing and securing your booming mobile environment, regardless of the variety of hardware and operating systems. Read More Now

When schools spy on their students, bad things happen
Sometimes even I am blown away by how mind-numbingly stupid people can be when it comes to technology. I'm not talking about people who can't find the "any" key. I'm talking about institutional stupidity, the kind you only get when you mix technophobic bureaucrats and geeks with no sense of boundaries. Read More

Cisco gaining mindshare in security, says research firm
A survey of 259 information security professionals shows Cisco gaining clout with them as a network-security provider, according to research firm TheInfoPro. Read More


WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

Federal judge orders Pa. schools to stop laptop spying
A federal judge has ordered the Pennsylvania school district accused of spying on its students to stop activating the cameras in school-issued MacBook laptops. Read More

Five Security Missteps Made in the Name of Compliance
In the hurry to meet a regulatory compliance deadline, companies risk making some costly security mistakes. Here are five examples. Read More

Virtualised USB key beats keyloggers
Is this the future of online banking? US company IronKey has come up with a USB drive that can be used to access accounts virtually without involving the operating system or applications that cause so many of today's security problems. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Forrester Research and Network World want to hear from you!
We are collaborating to conduct an on-line-based study focused around data center strategy. The survey should take approximately 12 to 15 minutes to complete. This is both a confidential and anonymous survey and your results will only be used in aggregate. As a special thankyou, all respondents will receive a free copy of the resulting research report from Forrester – a $500 value! Thank you for taking the time to fill out the survey.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

Videogame your way through the Olympics
If you're bored with (or inspired by) NBC's coverage of the games, there's always your PC or video game system that lets you feel like you're competing in these events.

The technology behind the Vancouver Olympic Games
Bell Canada is claiming the Vancouver 2010 Olympic network as the first IP-based converged network at any Olympic or Paralympic Games. It will be built to provide seamless telephone, wireless, radio and Internet communications services for fans, media, athletes and officials from around the world.

MOST-READ STORIES

  1. Want a job? Get a computer science degree
  2. Beware the rogue Wi-Fi access point in Windows 7
  3. Cisco, Juniper, HP drive Ethernet switch market in Q4
  4. Best of the Tests 2010
  5. Fallout from Cisco, HP split
  6. Google's gigabit experiment a welcome prod in the side
  7. Cisco gaining mindshare in security, says research firm
  8. Chuck Norris botnet karate-chops routers hard
  9. Microsoft vs. Google: The empire strikes back
  10. Cisco and Juniper lost 10% of router market in 2009

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: