Search This Blog

Thursday, October 08, 2009

The Norm Coleman Web crash and full disclosure (part 2)

Laptop theft gives 850,000 doctors the blues; A look at stolen Hotmail data finds simple passwords
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Network World Research
rule

Storage Survey - Chance to win $500!
Are you involved with storage for your organization? Could you use an extra $500 cash? Come share your storage knowledge with us and enter a drawing for a chance to win $500 cash!

Click here to participate!

rule

Spotlight Story
The Norm Coleman Web crash and full disclosure (part 2)

In the first of this three-part series, Becki True, CISSP and I recounted the story of the breach of security of the colemanforsenate.com Web site. This second column is also the product of close collaboration between True and myself. Read full story

Related News:

Laptop theft gives 850,000 doctors the blues
Another stolen laptop ... and this time we have 850,000 doctors swallowing the bitter pill of knowing that their sensitive professional and personal information may have fallen into hands bent on identity theft. According to this report in Amednews.com, an American Medical Association publication:

A look at stolen Hotmail data finds simple passwords
1234567 may not be a very secure password, but it's popular on Hotmail.

The Seven Deadly Sins of Security Policy
Are your security policies really managing your organization's risks? Or are they just 'check-the-box' rules? We detail common policy mistakes security pros often make.

NASA says 200-yard long asteroid will miss Earth
NASA scientists have recalculated the path of a large asteroid known as Apophis and now say it has only a very slim chance of banging into Earth. 

Be cautious - be very, very cautious
In our last newsletter we discussed how our research into cloud computing had sensitized us to the overwhelming concern that IT organizations have for the security and privacy of their data. We also began to analyze how the US government has been gaining increasing power to access data that once appeared to be private. In this newsletter, we will continue that analysis and will also discuss what this means for IT organizations.

Harvard's robotic bees generate high-tech buzz
Harvard researchers recently got a $10 million grant to create a colony of flying robotic bees, or RoboBees to among other things, spur innovation in ultra-low-power computing and electronic "smart" sensors; and refine coordination algorithms to manage multiple, independent machines.

CIA endorses cloud computing, but only internally
One of the U.S. government's strongest advocates of cloud computing is also one of its most secretive operations: the CIA. The agency has adopted cloud computing in a big way, and it believes that the cloud approach makes IT environments more flexible and secure.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

October 08, 2009

MOST-READ STORIES

  1. 500 words too taxing? Does the 'T' in MIT stand for Tweet?
  2. Microsoft's mobile turnaround: what's at stake
  3. Malware flea market pays hackers to hijack PCs
  4. 10 seriously ridiculous hacks
  5. Pentagon: Our cloud is better than Google's
  6. For sale: Cisco data center rival Brocade
  7. Gmail, Yahoo Mail join Hotmail; passwords exposed
  8. Cisco releases IOS 15.0
  9. Is the worst of recession over for IT pros?
  10. Review: HP blade takes a stab at Cisco

VMware Data Backup and Recovery Best Practices
VMware offers extraordinary benefits, but it can come at the cost of extra storage, backup resources and administrative challenges. Data Domain deduplication storage offers a way out by reducing redundant data across VMware data backups, operating at disk speeds, and providing cost-effective replication for fast DR using backup images.
Click here to learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: