Search This Blog

Thursday, June 28, 2012

FTC goes after Wyndham for data breaches at its hotels

  Security Services Continue to Grow -- In the Enterprise | Newest Creepy Way to Frame Your Boss on Facebook?
 
  Network World Security

Forward this to a Friend >>>


FTC goes after Wyndham for data breaches at its hotels
A little over a month after the FBI warned travelers of an uptick in data being stolen via hotel Internet connections, the Federal Trade Commission has filed a complaint against Wyndham Worldwide Corporation and three of its subsidiaries for alleged data security failures that led to three data breaches at Wyndham hotels in less than two years. Read More


RESOURCE COMPLIMENTS OF: SolarWinds

The Case for SIEM in Proactive Network Defense Whitepaper
It's widely accepted that Security Information & Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis, but this technology is also key to actively defending your network. The proactive approach to network security is no longer a luxury, it's a necessity. This whitepaper explains how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide you with unprecedented network visibility, security and control. Download the free whitepaper.

WHITE PAPER: Sourcefire, Inc.

Sourcefire FireSIGHT: Context-Aware and Adaptive Security
Learn why Context-Aware and Adaptive Security is the key to effective protection today. View Now

Security Services Continue to Grow -- In the Enterprise
In my last blog, I presented some data about the extremely critical but often ignored security skills shortage. While 55% of enterprise organizations (i.e. more than 1,000 employees) plan to add information security headcount this year, 83% say it is "extremely difficult" or "somewhat difficult" to recruit and hire these folks. So if you need help and can't hire anyone new, what do you do? What... Read More

Newest Creepy Way to Frame Your Boss on Facebook?
Ever drink and drive a keyboard? How would you like to see your most embarrassing Facebook updates shared with the world? Your "secrets" are "safe" so long as your Facebook status is not public . . . well not really as nothing online is truly private and privacy invasion via big data is an entirely different subject, but a new site only exploits public Facebook drama updates. Read More

How to celebrate Tau Day
There's a movement afoot in mathematics to replace pi (3.14...) with tau (6.28...) Read More


WHITE PAPER: Check Point Software

Check Point 3D Security Analysis Report Tool
Reduce security risks with the Check Point 3D Security Analysis tool. This comprehensive security analysis provides an easy-to-read report that summarizes security events, their risks, and remediation. See sample report View Now

Five years ago they said the iPhone would be a flop ... Now?
Pundits who got it wrong explain why ... or deny that they did Read More

Do automatic OS X security updates signal a sea change at Apple?
Perhaps Apple was hoping nobody would notice the somewhat subtle changes in the language on its "Why you'll love a Mac" webpage. After all, "It doesn't get PC viruses" and "It's built to be safe" are both reassuring messages. Not all that much difference between "Safeguard your data. By doing nothing," and "Safety. Built right in," right? Wrong. Read More

Allgress Wants To Make Risk Management Easier And More Efficient
Allgress, a company making it easier and more efficient manage risk and provide insight in governance, risk and compliance launched today. I had a chance to sit down and speak with Jeff Bennet, president and COO of Allgress, along with Dave Cullinane, former CISO of eBay. Read More


WHITE PAPER: Dell

Is Your Infrastructure Mobile Ready?
From data encryption to secure printing, there are many challenges IT mangers at small and midsize businesses face to secure mobile devices. Check out the resources in this Mobility KnowledgeVault to help develop a master plan. Learn More

Cybercriminals build massive banking fraud system in the cloud
Cybercriminals have built a cloud-based fraud system that targeted wealthy people and commercial accounts in bilking primarily European banks of possibly billions of dollars, security vendors say. Read More

Symantec: World has 2.2 zettabytes of business data that costs $1.1 trillion to store and secure
Worldwide, organizations hold about 2.2 zettabytes of data and spend about $1.1 trillion to secure and provide access to it, according to Symantec. Read More

Researchers devise practical key recovery attack against smart cards, security tokens
A team of cryptographic researchers claim to have developed an attack method that can be used to recover secret keys in an acceptable time frame from cryptographic devices like smart cards, hardware security modules and USB security tokens. Read More

 
 
 

SLIDESHOWS

Top CIOs take home seven-figure pay packages
Fortune 500 CIOs and IT SVPs netted multimillion dollar compensation packages in 2011.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. The 10 most demanding jobs in IT
  2. Apps come to the router
  3. Cisco adds 802.11ac, cloud features to new home router
  4. A look back: Steve Ballmer laughs at the iPhone
  5. 9 Android devices getting an unofficial Ice Cream Sandwich upgrade
  6. Top CIOs take home seven-figure pay packages
  7. Six-figure IT salaries not just for CIOs, SVPs
  8. Bank hack: 'Operation High Roller' has netted $78M -- so far
  9. For such a nice tablet, Microsoft is doing a lot of things wrong
  10. Five needs driving SDNs
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: