Tuesday, October 20, 2009

Hiring hackers: A rebuttal (part 2)

Security flubs cost ChoicePoint additional $275,000; NASA network security torched
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Fortinet
rule

Webcast: When Good Applications Go Bad
Register today to hear Andrew Jaquith, Senior Analyst at Forrester Research, and Anthony James, VP Products at Fortinet, discuss the challenges posed to enterprises by application security threats. Additionally, hear a customer testimonial on how CKE Restaurants, responsible for operating many of the USA's most popular quick-service and fast-casual dining restaurants, reduced the risk of application-borne threats.

Register now.

rule

Spotlight Story
Hiring hackers: A rebuttal (part 2)

The original articles on hiring hackers and criminal hackers into IT groups as programmers, network administrators and security personnel did not discuss the merits or the consideration of hiring a bona fide hacker. Read full story

Related News:

Security flubs cost ChoicePoint additional $275,000
Not that a $275,000 fine will make your personal data any more secure but data brokers ChoicePoint today agreed to bolster yet again its data security and pay $275,000 to settle Federal Trade Commission charges it failed on the first go-around to implement a court-ordered comprehensive information security program. ChoicePoint is now required to report to the FTC - every two months for two years - detailed information about how it is protecting the breached database and certain other databases and records containing personal information.

NASA network security torched
While NASA may be focused on keeping its manned space flight plans intact, apparently it has seriously neglected the security of its networks.

How hackers find your weak spots
While there are an infinite number of social engineering exploits, typical ones include the following:

Ford tech trade secrets stolen by China?
Despite the fact that the auto industry is going through some extremely tough times apparently doesn't make foreign countries covet its technology any less.

Mozilla blocks Microsoft's sneaky Firefox plug-in
Mozilla has blocked the Microsoft-made software -- an add-on dubbed ".NET Framework Assistant" and a plug-in named "Windows Presentation Foundation" -- that had put Firefox users at risk from attack.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

10 Ways to Increase Power System Availability in Data Centers
Data centers rely on a continuous supply of clean electricity. However, anything from a subtle power system design flaw to a failure in the electrical grid can easily bring down even the most modern and sophisticated data center. Fortunately, organizations can significantly mitigate their exposure to power-related downtime by adopting proven changes to their business processes and electrical power system management practices. This white paper discusses 10 such underutilized best practices for building and maintaining a highly available data center power infrastructure.
Read Now


Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More

 

October 20, 2009

MOST-READ STORIES

  1. Verizon fires shots across iPhone's bow with Droid smartphone
  2. Mozilla blocks Microsoft's sneaky Firefox plug-in
  3. 10 things you need to know about Windows 7
  4. Ethernet everywhere!
  5. Symantec calls 'SpywareGuard', 'Antivirus' top scareware threats
  6. The 'Net's most heinous hoaxes
  7. Missing dot drops Sweden off the Internet
  8. Husband, wife team arrested for allegedly stealing from Cisco
  9. How to royally foul-up an IT outsourcing project
  10. The Internet has shifted under our feet

Why Small Companies Should Think Outside Box for Protecting Endpoints
In their "Sector Insight" study, Aberdeen Group investigated the considerations small business should take when selecting anti-malware solutions. Read this paper to learn why Aberdeen recommends small enterprises be open to endpoint security solutions from vendors other than McAfee and Symantec.
Read Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment