Search This Blog

Friday, June 22, 2012

The Worst Data Breach Incidents of 2012 – So Far

US-CERT discloses security flaw in Intel chips | Defense contracts worth billions cover network operations, cyberthreat sharing, Android security

Network World Compliance

Forward this to a Friend >>>


The Worst Data Breach Incidents of 2012 – So Far
Out of 189 breaches recorded through mid-June, here are the top 15 according to Identity Theft Resource Center. Read More


RESOURCE COMPLIMENTS OF: SolarWinds

Top 5 Reasons to Choose SolarWinds® LEM Over Splunk®.
SolarWinds Log & Event Manager (LEM), with node-based licensing that lets you pay only for what you monitor, is an affordable alternative to volume-based Splunk pricing. With real-time, in-memory event log correlation, active response technology and advanced IT search, you get all the features of a powerful SIEM solution, at an affordable price! Interested in learning more about powerful SIEM software for log collection, analysis and event management from SolarWinds? Click here to learn more and why to choose SolarWinds LEM over Splunk!

WHITE PAPER: Fluke Networks

How to Choose a Datacenter OTDR
This white paper helps fiber installers and network technicians understand the key parameters for selecting an OTDR. Choosing the right device not only solves this new generation of datacenter testing requirements, but also helps professionals work efficiently, and increase the reliability and value of the enterprise fiber network. Learn More!

US-CERT discloses security flaw in Intel chips
Allow hackers to gain control of Windows, other operating systems Read More

Defense contracts worth billions cover network operations, cyberthreat sharing, Android security
The Defense Information Systems Agency (DISA) this week awarded Lockheed Martin a three-year contract to support operations and security on the Department of Defense global data network. The contract, which could be extended up to four additional years, might reach a potential $4.6 billion over seven years. Read More

Check Point product line offers anti-DDoS protection
Check Point Software Technologies Ltd. today announced its first line of products to fight distributed denial-of-service attacks (DDoS). Read More


WHITE PAPER: CenturyLink

Network/Cloud Security & Business Continuity eGuide
Network security today means much more than simply building a perimeter around the enterprise network to defend from threats. With cloud-computing models becoming more popular, enterprises are extending corporate data and applications outside the four walls of the data center. Learn More!

LinkedIn hit with lawsuit over massive data breach
LinkedIn has been hit with a potential class-action lawsuit alleging it failed to meet "industry standard" security practices in connection with a massive data breach earlier this month, according to court documents. Read More

Former tech-challenged Russian spy hits the modeling runway
The red-headed Russian whose spy ring made tech blunder after tech blunder on its way to being summarily deported from the U.S. is now prowling the catwalk at fashion shows. Read More

Young employees say BYOD a 'right' not 'privilege'
A survey that asked thousands of young "20-something" workers their attitudes about bring-your-own-device"policies found slightly more than half view it as their "right" to use their own mobile devices at work, rather than BYOD being just a "privilege." Read More


WHITE PAPER: Silver Peak Systems, Inc.

WAN Optimization eGuide
In this eGuide, articles from Network World examine the maturing WAN optimization market, collect advice from experts and users on how best to implement these products, and look at new trends. Read on to discover how to make the most of WAN optimization in enterprise networks. Read now.

Should best cybercrime defense include some offense?
A growing number of U.S. companies have concluded that in their battle against hackers, the best defense has to include some offense. Read More

20 surefire IT mistakes
Beware these all-to-common IT blunders before they derail your career Read More

What You Really Need to Know About Cloud Security
Despite all of the hand wringing over cloud security, major cloud security breaches haven't been grabbing headlines. The past year has seen major breaches, such as the ones that hit Sony and Epsilon, but we haven't heard much of an emphasis about the cloud being a weakness. Read More

Stuxnet cyberattack by US a 'destabilizing and dangerous' course of action, security expert Bruce Schneier says
Revelations by The New York Times that President Barack Obama in his role as commander in chief ordered the Stuxnet cyberattack against Iran's uranium-enrichment facility two years ago in cahoots with Israel is generating controversy, with Washington in an uproar over national-security leaks. But the important question is whether this covert action of sabotage against Iran, the first known major cyberattack authorized by a U.S. president, is the right course for the country to take. Are secret cyberattacks helping the U.S. solve geo-political problems or actually making things worse? Read More



SLIDESHOWS

Cool Summer Gadget Guide
Here are some suggestions for some great summer gadgets for work, travel, outdoors and exercise that will get you more enjoyment out of the summer season.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Microsoft previews Windows Phone 8
  2. Microsoft, Google, IBM and Salesforce.com heat up PaaS
  3. Five years later: Do Apple's first ads ring a bell?
  4. Larry Ellison to buy Hawaiian island
  5. Surface vs. iPad: The weight of the world on Microsoft
  6. Review: Samsung Galaxy S III smartphone
  7. Young employees say BYOD a 'right' not 'privilege'
  8. The worst data breach incidents of 2012 - so far
  9. Juniper confines SDNs to data center
  10. 10 things we like about Ubuntu Linux 12.04

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment:

Anonymous said...

Wow, fantastic blog layout! How lengthy have you
ever been running a blog for? you made running a blog look easy.

The overall look of your website is excellent, as smartly as the content!


Review my webpage ... basal metabolic rate calculator