Thursday, September 17, 2009

What can be done to ensure online privacy?

What can be done to ensure online privacy?; Quick actions help financial firm avoid security disaster
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Arbor Networks, Inc.
rule

Protecting Internet Data Centers
Your Internet data center plays a vital role in the success of your business. Learn how optimizing and protecting your IDC's network infrastructure, IP-based services and data before they fall victim to attacks or compromise ensures that your network and in-cloud services remain available and profitable.

Click to continue

rule

Spotlight Story
Microsoft offers tools for secure app development

The tools help developers add security and privacy provisions into the development lifecycle, but their enterprise usefulness is unclear as they are only for C and C++ Read full story

Related News:

What can be done to ensure online privacy?
The Federal Trade Commission later this year is holding public roundtables to look at the privacy challenges posed by the vast array of technology and business practices including social networking, cloud computing, online behavioral advertising, mobile marketing, and the collection and use of information by retailers, data brokers, third-party applications.

Quick actions help financial firm avoid security disaster
While most of the IT world has been spared a devasting security attack like Blaster and Sasser for the last few years, the damage wrought by all manner lesser-known computer viruses continues to inflict corporate pain.

Phishing attacks go down by 45 percent: Symantec
Symantec observed a 45 per cent decrease from the previous month in all phishing attacks, according to its September State of Phishing report.

Web server attacks, poor app patching make for lethal mix
A dangerous combination of a massive increase in Web server attacks and poor patching practices is a major cause of concern for experts, according to a report issued today by several security organizations.

Software helps robots make intelligent decisions
In its quest for ever-smarter robots, military researchers this week gave a $850,000 grant robotics and automation vendor TRACLabs to build software that can help robots use their sensor systems more intelligently.

Cloud security through control vs.ownership
Cloud computing makes auditors cringe. It's something we hear consistently from enterprise customers: it was hard enough to make virtualization "palatable" to auditors; cloud is going to be even harder. By breaking the links between hardware and software, virtualization liberates workloads from the physical constraints of a single machine. Cloud takes that a step further making the physical location irrelevant and even obscure.

Internet scammers leap on Patrick Swayze's death
Malware ghouls took just a few hours to begin preying on the death of actor Patrick Swayze with a new version of a familiar phony anti-virus scam.

The other iPhone lie: VPN policy support
The iPhone OS 3.1 fixed false reporting about Exchange policy adherence. It turns out that a similar flaw existed for VPN policies, too

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 17, 2009

TOP STORIES | MOST DUGG STORIES

  1. Microsoft greasing Win 7 skids with early release of desktop tools
  2. Domain-name abuse proliferates
  3. Windows 7 touch: Dead on arrival
  4. Sprint CEO calls the iPhone the "Michael Jordan" of smartphones
  5. IEEE stamps "approved" on 802.11n Wi-Fi standard
  6. Developer denies software to beat Chinese censors is malicious
  7. Avaya wins Nortel enterprise business for $900 million
  8. A tale of two college Wi-Fi networks and 802.11n
  9. 10 cool Web apps developed in two days
  10. Ethernet switch vendors propose data center collapse

Staying a step ahead of the hackers
Security managers may work for midsize or large organizations; they may operate from anywhere on the globe. But inevitably, they share a common goal: to better manage the risks associated with their business infrastructure. Increasingly, Web application security plays a significant role in achieving that goal.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment