Friday, November 13, 2009

SAS chief: Hot on fraud detection, cool on cloud computing

FTC slaps contempt charge on BlueHippo; Apple issues week's second patch set, fixes 7 Safari flaws
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by IBM
rule

IBM ISS X-Force Threat and Risk Report
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.

Download now!

rule

Spotlight Story
SAS chief: Hot on fraud detection, cool on cloud computing

At a recent media event, SAS CEO Dr. Jim Goodnight spoke with IDG Enterprise Chief Content Officer John Gallant about how businesses did -- and didn't -- take advantage of BI during the downturn and how the economy has changed the playing field in the BI market. Read full story

Related News:

FTC slaps contempt charge on BlueHippo
The Federal Trade Commission today asked a federal court to issue a contempt order against BlueHippo for violating a 2008 agreement that required the company to pay $3.5 million for consumer redress and barred the defendants from further deceiving customers. 

Apple issues week's second patch set, fixes 7 Safari flaws
Apple on Wednesday issued its second security update in three days, patching seven vulnerabilities in Safari, including one in the Windows version that the company fixed two months ago for most Mac users.

Military wants lightweight fiber lasers for unmanned aircraft
Military researchers are looking for a 22lb laser that can fit and operate in high-altitude unmanned aircraft. 

How to DDOS a federal wiretap
Researchers at the University of Pennsylvania say they've discovered a way to circumvent the networking technology used by law enforcement to tap phone lines in the U.S.

Facebook Tips: Staying Safe While Using Games and Apps
The maker of the popular FarmVille game has agreed to change its practices that subjected Facebook users to some scammy offers. But the more games and apps that you use on Facebook, the higher your risk for malware, phishing scams and hacking. Here are four tips for staying secure.

Air Force: US decades behind on satellite protection
Too little is known about what potential foes have placed into space and how much space debris is threatening to damage American orbiters. And the US needs to deploy more space sensors, satellites and satellite protection and quickly: "We are decades behind where we should be, in my view." 

H1N1 drives demand for secure remote access
Vendors of remote access technologies are reporting an unexpected increase in demand for their products over the past several months as a result of companies' H1N1-related concerns.

Rutgers researchers cooking up safer password clues
Rutgers University researchers are testing whether "activity-based" password hint questions are better at safeguarding security than the static ones we're all used to, such as "What's your mother's maiden name?" These activity-based password clues would be tied to your recent activity, like "What were you doing at noon yesterday?"

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved.
Building a Successful Security Operations Center


Protecting Your Intellectual Property
Learn about the growing threat of insider data theft, the extent to which most companies are vulnerable, and how McAfee security products enable businesses to protect their most valuable asset-their data.
Click here.

 

November 13, 2009

MOST-READ STORIES

  1. HP buying 3Com in $2.7 billion blockbuster
  2. 3Com co-founder Metcalfe's quick take on HP-3Com buyout
  3. Priceless! The 25 funniest vintage tech ads
  4. 3Com: one of the longest running shows in networking
  5. 3Com saved by HP - and Cisco
  6. Inside the posh pads of tech's elite
  7. IA job prospects bright
  8. Rotten Apple: Apple's 12 biggest failures
  9. Verbal and visual mashup of HP's reasons for buying 3Com
  10. Security pros seek hacking, forensics skills

The Importance of Measuring Power in Your Data Center
Historically, IT managers worried little about power consumption. This has quickly changed due to limits in power availability, the cost of power and companies' green initiatives. This white paper explores why and where power should be measured, what to do once data is gathered, and emerging new technologies.
Read More.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment