Thursday, October 22, 2009

Understanding and implementing information security metrics

Coffins in the mail are a trick of the cybercrime trade; FTC slams MoneyGram with $18M charge to settle fraud complaints
Network World logo

Security Strategies Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by TippingPoint
rule

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.

Read More

rule

Spotlight Story
Understanding and implementing information security metrics

One of the cornerstones of the scientific method is measurability: a focus on defining the ways of counting or measuring aspects of reality that we hope will be strongly associated with the phenomena we are trying to understand. Read full story

Related News:

Coffins in the mail are a trick of the cybercrime trade
There's never been a better time to get involved in cybercrime.

FTC slams MoneyGram with $18M charge to settle fraud complaints
This place sounds like scam central. The second-largest money transfer service in the United States, MoneyGram International today agreed to pay $18 million in consumer redress to settle FTC charges that the company allowed its money transfer system to be used by fraudulent telemarketers to bilk U.S. consumers out of tens of millions of dollars. 

Consumers should clean up their act on personal security
PC users leave too many clues fore hackers - and social networking sites make the problem worse warns a researcher

Facial-recognition system can guess your age
ORLANDO -- Those advertising in public places would really like to know the age and gender of those viewing their ads to see if they're hitting the right demographic. An experimental facial-recognition system developed by NEC does a pretty good job of delivering just that information.

Two out of five at risk from Wi-Fi hijacking
Two out of five web users are at risk of having their Wi-Fi connection hijacked, says TalkTalk.

Open source security project could get a boost with Metasploit buy
Rapid7 is buying Metasploit, and promising to advance open source penetration testing and the Metasploit Project, which develops exploits against known vulnerabilities.

Gartner on cloud security: 'Our nightmare scenario is here now'
Virtualization and cloud computing shaking up the old order, and the customary control is slipping away from security managers as the revolution unfolds.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

The Power of Virtualized Web Application Delivery
The increased dependency on Web applications has created greater complexity in the environment making availability, performance and security of Web applications an imperative. This white paper discusses how any size organization can tune its Web application delivery services with a virtualized solution that will meet the unique characteristics of each individual application.
Read More


Top to Bottom Performance Management Excellence at the City of Chicago
In this featured City of Chicago case study, learn how the City's performance management efforts leveraged BIRT Performance Scorecard to: Save $10 million by improving their management of Overtime through Performance Management, break down departmental silos by facilitating cross-communication and consolidating financial payment processes and unify the performance management efforts of 36 city departments. Attend this web seminar to receive a complimentary copy of the City of Chicago case study.
Click here to register today.

 

October 22, 2009

MOST-READ STORIES

  1. IBM takes aim at Windows 7 with new desktop offering
  2. The top 7 roadkill victims on the journey to Windows 7
  3. Reports: Google to launch music service and phone
  4. Goodbye steering wheel, here comes drive-by-joystick
  5. Verizon fires shots across iPhone's bow with Droid smartphone
  6. Deck out your home office
  7. Facebook for scientists gets millions in funding
  8. Cisco unveils new generation of branch routers
  9. What the heck are you doing on the Internet at that hour?
  10. Ballmer takes on SharePoint future, software licensing issues, Sidekick woes

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment