Tuesday, January 17, 2012

RSA chief: Last year's breach has silver lining

Q&A: RSA's Art Coviello reflects on last year's big data breach | Security roundup: The fury of Anonymous, the humiliation of Stratfor

Network World Security

Forward this to a Friend >>>


RSA chief: Last year's breach has silver lining
Last year's industry-shaking RSA Security breach has resulted in customers' CEOs and CIOs engaging much more closely with the vendor to improve their organizations' security, according to the head of RSA. Read More


WEBCAST: ForeScout Technologies

Experts Help CIOs Rethink Threat Prevention
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

WHITE PAPER: CA Technologies

Newly Updated: Application and Delivery Handbook
This independent application and service delivery handbook dives deep into the issues impacting optimization, from minor network delays and virtualization, to ensuring security, management and performance of Web applications and troubleshooting a hybrid cloud environment. Read More

Q&A: RSA's Art Coviello reflects on last year's big data breach
RSA Security Chairman Art Coviello says customers still want to hear details about how the company so quickly detected the data breach that last year compromised its SecurID tokens. Read More

Security roundup: The fury of Anonymous, the humiliation of Stratfor
The hactivist group Anonymous, or at least someone with the handle "FuryOfAnon" who claims to be part of the collective, last week published a list of Internet-facing Israeli SCADA (supervisory control and data acquisition) systems and purported log-in details. "Who wanna have some fun with Israeli scada systems?" the message said. Read More


WEBCAST: NetIQ

Disaster Recovery Planning and the Cloud
Find out how virtualization is the stepping stone to the cloud and how to leverage virtualization technologies today to reduce the cost and improve the performance of your disaster recovery plan. Learn More!

Survey: Security deployments, training reduce cyberattack wipeouts, downtime
A survey of 1,425 information technology managers in 32 countries about the type of security they deployed on their network endpoints, as well as security training for employees, indicates that these technology investments paid off in mitigating cyberattacks and downtime. Read More

Slashdotters rain on 'cloud computing'
Picking just one from the list Slashdot offers in its "least worthy tech world clichés/buzzwords" poll takes a fair amount of determination, as they are all worthy contenders. Your choices: ultrabook, the cloud/cloud computing, advanced persistent threat, solution, God particle, and "some other option (explained in comments)." Read More


WEBCAST: VMware & NetApp

Path to Cloud: Virtualizing Business Critical Applications
NetApp and VMware experts discuss how customers can virtualize business-critical applications leveraging common resource pools as key elements to delivering IT as a service. Learn More!

10 questions for Skybox Security CFO Lior Barak
Name: Lior Barak Read More

DHS media monitoring could chill public dissent, EPIC warns
The U.S. Department of Homeland Security is engaging in media monitoring activity that achieves no public safety goals and will likely have a chilling effect on legitimate criticism of the agency, a leading privacy advocacy group warned. Read More

Non-US customers kept in dark as Zappos cleans up after data breach
Online shoe and apparel shop Zappos.com is advising over 24 million customers to change their passwords following a data breach, but its website is currently inaccessible to people outside the U.S. Read More

Cyber insurance offers IT peace of mind -- or maybe not
If your company were hit with a cyber attack today, would it be able to foot the bill? The entire bill, including costs from regulatory fines, potential lawsuits, damage to your organization's brand, and hardware and software repair, recovery and protection? Read More



SLIDESHOWS

CES 2012 ultrabooks and tablets
Ultrabooks! Ultrabooks! That's the official biggest buzzword for this year's Consumer Electronics Show in Las Vegas. Ultrabooks! In honor of these purportedly magical super-thin laptops, we've decided to make a compilation of some of the ultrabooks you'll see at CES next week. And for good measure, we've thrown in a tablet that will garner a lot of attention as well. Enjoy!

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. IPad 3 rumor rollup for the week ending Jan. 11
  2. IBM smashes Moore's Law, cuts bit size to 12 atoms
  3. Google Science Fair back for second year
  4. The best of CES 2012
  5. New era for Web site names begins Thursday
  6. Cisco sending enterprises to the cloud
  7. IPhone 5 rumor rollup for the week ending Dec. 31
  8. LTE explodes at CES
  9. IBM wins most patents for 19th straight year
  10. Google pleads for more unlicensed spectrum instead of more auctions

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment