Search This Blog

Wednesday, September 02, 2009

BBN lands $42M to develop DARPA’s advanced network prioritization, security technology

Hospital taps Verizon for security review; Health privacy undermined: Worst breaches of 2009
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Qwest
rule

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.

Read More

rule

Spotlight Story
BBN lands $42M to develop DARPA's advanced network prioritization, security technology

DARPA's network technology will include support for features like 32 levels of network traffic prioritization. Read full story

Related News:

Hospital taps Verizon for security review
The Obama Administration's push towards electronic exchange of health information is putting the spotlight on the security of health information held by hospitals, physicians and other healthcare providers.

Health privacy undermined: Worst breaches of 2009
Octo-mom, ransom notes and stolen Blackberries entangled in these tales of health information breaches and lost medical records

Five indicted in long-running cybercrime operation
New York prosecutors indicted five Eastern European men on Monday in an extensive credit-card fraud operation that netted the defendants at least US$4 million from some 95,000 stolen card numbers.

Is your health privacy at risk?
The year's worst health information breaches, which compromised millions of patient records, show just how vulnerable health privacy is to hacker attacks.

Pseudonymous critic impugns integrity of all security professionals
In a recent response to an article on hiring hackers, a pseudonymous critic calling itself "Secure network..." posted a comment entitled "so called hacking and security professionals." It started with the run-on sentence, "Of course someone calling them selves[sic] a 'security Professional' would be upset, it's job security they're losing...."

Data leakage prevention going mainstream
Data leakage or data loss prevention systems have gradually entered the mainstream as their increasing maturity has allowed increasing adoption. From barely registering in our research two years ago, we now find different forms of DLP in about one-third of enterprises in Nemertes Research's spring 2009 benchmark study.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

IDC: Optimizing Storage to Reduce Data Footprint and Lower Costs
Read this review on today's storage optimization and technologies. Learn how they reduce the data footprint and identify how various technologies work toward this goal.
Learn more


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 02, 2009

TOP STORIES | MOST DUGG STORIES

  1. Wi-Fi encryption cracked in 60 seconds
  2. 12 cool ways to donate your PC's spare processing power
  3. Developer denies software to beat Chinese censors is malicious
  4. 15 smartphone apps you shouldn't live without
  5. Only 13% of Wikipedia contributors are women
  6. The ABCs of WAN optimization savings
  7. 12 words you can never say in the office
  8. Apple: 'Exploding' iPhones 'not our fault'
  9. Slideshow: VMworld product blitz
  10. Group offers tools to evade China's Web censorship

IBM ISS X-Force Threat and Risk Report
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Read Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: