How to stop IT managers from going rogue Nearly half of all data breaches come from inside an organization, which is why industry watchers say enterprise IT departments need to invest in technology that ensures no one person has all the power. Slideshow: Commercial web browser turns 15 he Web browser turns 15 on Oct. 13, 2009 a key milestone in the history of the Internet. That's when the first commercial Web browser eventually called Netscape Navigator was released as beta code. While researchers including World Wide Web inventor Tim Berners-Lee and a team at the National Center for Supercomputing Applications created Unix browsers between 1991 and 1994, Netscape Navigator made this small piece of desktop software a household name. By allowing average users to view text and images posted on Web sites, Netscape Navigator helped launch the Internet era along with multiple browser wars, government-led lawsuits and many software innovations. Here are 15 highlights in the history of the Web browser PayChoice offers more details about data breach PayChoice, which this week confirmed that its online payroll systems operations were breached on Sept. 23, is now beginning to offer details on what it thinks may have happened. Microsoft ships RC1 of new Forefront Identity Manager Microsoft ships identity infrastructure software that will figure prominently in its plan to integrate security and identity technologies to protect clients, servers and the network edge. Cisco extends security controls to 'dark Web' Cisco is tackling the 'dark Web' of online content that's not easily indexed with new usage controls for its IronPort S-Series Web Security Appliances. Compromised Hotmail, Yahoo, Gmail accounts exploited in fake shopping scam In the wake of the posting in online forums of stolen account and password information for thousands of Hotmail, Gmail and Yahoo e-mail accounts, there's evidence of yet more abuse that entails attackers exploiting that information to hack into compromised accounts over the last few days to send spam aimed at stealing credit cards. Be cautious - be very, very cautious In our last newsletter we discussed how our research into cloud computing had sensitized us to the overwhelming concern that IT organizations have for the security and privacy of their data. We also began to analyze how the US government has been gaining increasing power to access data that once appeared to be private. In this newsletter, we will continue that analysis and will also discuss what this means for IT organizations. CIA endorses cloud computing, but only internally One of the U.S. government's strongest advocates of cloud computing is also one of its most secretive operations: the CIA. The agency has adopted cloud computing in a big way, and it believes that the cloud approach makes IT environments more flexible and secure. Report: Dozens indicted in widespread phishing scheme The L.A. Times reported that more than 50 people will be indicted today on charges related to a phishing scheme that led to the theft of bank acount information from thousands of people in the U.S. Bitbucket's downtime is a cautionary cloud tale Bitbucket's weekend troubles with Amazon's cloud services are instructive, but don't necessarily indicate a problem with cloud security. Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Network World on Twitter? You bet we are |
No comments:
Post a Comment