Search This Blog

Thursday, August 04, 2011

Disintermediation affects reputation

Corporate cybercrime costs skyrocket | US wants to build cybersecurity protection plan for cars

Network World Security Strategies

Forward this to a Friend >>>


Disintermediation affects reputation
Reviews from satisfied and dissatisfied customers and clients are posted on a wide range of sites on the Web; typing "consumer reviews" as a search term (including the quotation marks) in Google produces over 73 million hits. Some sites specifically address angry posters; for example, Pissed Consumer specifically solicits complaints. Read More


WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

WHITE PAPER: BMC

Managing Cloud Services from Request to Retirement
This lifecycle is tailored to the needs of the business, with both the flexibility to deliver the full required software stacks and the management rigor to ensure the operational integrity of the cloud. Read More Today!

Corporate cybercrime costs skyrocket
Security threats such as malware, insider attacks, phishing, botnets and a host of other problems are costing large corporations more money to handle. Read More

US wants to build cybersecurity protection plan for cars
As cars and other forms of transportation increasingly rely on online systems for everything from safety to onboard entertainment, the cybersecurity threat from those who would exploit such electronic control packages has also Read More


WHITE PAPER: Sybase

The Enterprise Mobility Guide 2011
The Enterprise Mobility Guide 2011 features articles by industry experts, analysts and top executives on the latest mobile enterprise trends, real-world success stories, security requirements, device management, app development and more. Get a copy now, compliments of Sybase. Read More

US warns Anonymous, LulzSec could up their game
Hacker groups such as Anonymous and Lulz Security may need to be monitored more closely in the event they are assisted by other hackers with higher skill levels and decide to strike critical infrastructure. Read More

US court rejects dismissal in China Internet filter case
A U.S. court rejected motions to dismiss defendants in a US$2.2 billion lawsuit involving a Chinese government-backed Web filtering package that was allegedly built from stolen code, stating that the court had jurisdiction over the case even though the Web filter makers are in China. Read More


WHITE PAPER: CA Technologies

Three steps to agile change
Comprehensive IT change configuration and release management (CCRM) continues to confound and frustrate both IT and the business units for which it provides services. But by first instituting the appropriate foundational processes and supporting tools, many enterprises are experiencing renewed CCRM success. Read Now

Check Point Aims Wide and High
In July, Check Point Software beat Wall Street estimates when the company posted over $300 million in revenue, up 15% from 2Q 2010. Check Point also reported that product and software licensing revenue is up 15% from a year ago. Why is Check Point growing? Check Point firewalls have always held a very valuable piece of network real estate, separating corporate networks from a crime infested community... Read More

Spike in mobile malware doubles Android users' chances of infection
An explosion in mobile malware during the last six months has more than doubled the chance that a user's Android smartphone will become infected, a security researcher said today. Read More

McAfee: Hackers compromised 72 organizations since 2006
Security vendor McAfee published a detailed report on Tuesday about a hacking group that penetrated 72 companies and organizations in 14 countries since 2006 in a massive operation that stole national secrets, business plans and other sensitive information. Read More

Take cyberthreats seriously, says counter-terrorism expert
Cofer Black warns that government officials shouldn't dismiss warnings of imminent cyberattacks. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Chromebooks you can buy now
Here's a roundup of computing devices that run Chrome OS, a few which you can buy now, or which may be on the way.

MOST-READ STORIES

  1. 5 surprising IT skills that hiring managers want now
  2. Android Trojan records phone calls
  3. DARPA software to spin 'dumb' photos or video into intelligence gold
  4. Apple iPad 3 prototypes everywhere
  5. Why Wi-Fi as we know it is in trouble
  6. System links your face to your Social Security number
  7. Check Point has sights set on 1Tbps firewall
  8. 10 technologies that will change the world in the next 10 years
  9. HP extends Cisco switch trade-in program
  10. Google, data centers using less power than expected

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: