Thursday, May 24, 2012

Confidential data: Delete it or eat it, say security experts

  NASA and cybersecurity: Ground control to Major Tom? | LulzSec MilitarySingles data breach caused by weak security
 
  Network World Security

Forward this to a Friend >>>


Confidential data: Delete it or eat it, say security experts
The only way for companies to guarantee their confidential data can't be stolen is to delete it. But few companies are making use of that guarantee, say security experts. Read More


WHITE PAPER: Quest Software

Exchange 2010 and Your Audit Strategy
In this Quest Software white paper, discover how to easily understand and control who accesses your company's sensitive data. Learn to implement a strong Exchange 2010 audit strategy, and read about the options that give you the power to safeguard your company's vital information. Read it today. Read Now!

WHITE PAPER: Fortinet

Next-Generation Security for Enterprise Networks
Since the concept of a 'next-generation firewall' was introduced several years ago by Gartner, many network security vendors have introduced their own next-generation firewalls to address this product category - but with varying results. View Now

NASA and cybersecurity: Ground control to Major Tom?
Latest claimed attack by Iranian students piles on to 47 attacks in fiscal year 2011, with 13 compromising the agency's computers Read More

LulzSec MilitarySingles data breach caused by weak security
The major LulzSec data raid on the MilitarySingles.com dating site in March was caused by a catalogue of security problems including poor web application design and the use of weak encryption, an analysis from Imperva has claimed. Read More


WEBCAST: IBM

Accelerate Document Processing and Wow Your Customers
Learn how intelligent imaging and BPM solutions, coupled with pragmatic best practices and methodology, can improve productivity, lower cost, increase accuracy, reduce cycle times and lower overall risk. Learn More

Are CEOs getting the social media thing?
IBM says a study it did of some 1,700 Chief Executive Officers worldwide found that many indeed - or should be -- grasping social media as a key enabler of collaboration and innovation. Read More

Is your dirty, nasty office making you sick?
A study out today confirms what some people may have suspected - your office environment is a dirty place - and we're not just talking about the usual suspect: the bathroom. According to Kimberly-Clark Professional the place where US workers eat and fix their lunch topped the list of office germ "hot-spots," with sink and microwave door handles found to be the dirtiest surfaces touched by office workers... Read More


WHITE PAPER: Check Point Software

Check Point 3D Security Analysis Report Tool
Reduce security risks with the Check Point 3D Security Analysis tool. This comprehensive security analysis provides an easy-to-read report that summarizes security events, their risks, and remediation. See sample report View Now

Study Finds 1 in 2 Americans are 'Clueless' about Webcam Hacking
I was surprised to see a CamPatch study that revealed "1 in 2 Americans clueless about webcam hacking." The release called webcam hacking "the latest trend in cybercrime" and stated 51% of laptop users did not know it was possible for a hacker to remotely access and turn on webcams - allowing cybercriminals to secretly watch and record unsuspecting victims." This made me suspiciously look up the company,... Read More

Study: Patriot Act gives US government no special acess to cloud data
An often-repeated concern that the U.S. Patriot Act gives the U.S. government unequaled access to personal data stored on cloud services is incorrect, with several other nations enjoying similar access to cloud data, according to a study released Wednesday. Read More

McAfee reports big spike in malware
PC malware had its "busiest quarter in recent history," according to McAfee's quarterly security report released Wednesday. Read More

 
 
 

SLIDESHOWS

Whose high-tech exec job hinges on the presidential election?
There are a ton of high-tech managers and regulators in the federalgovernment who may be changing jobs come November.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Google warns users infected with DNSCharger as Web outage nears
  2. Groups launch gigabit-per-second broadband project
  3. Sales of unused IPv4 addresses gathering steam
  4. 9 warning signs of bad IT architecture
  5. Study finds 1 in 2 Americans are 'clueless' about Webcam hacking
  6. 10 years later, Alcatel-Lucent revisits Cisco and Juniper in the core
  7. VMware acquires desktop management company Wanova
  8. Is your dirty, nasty office making you sick?
  9. Consider desktops in the cloud for BYOD
  10. Windows 8 puts end to endless reboots
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment