Friday, January 29, 2010

DDoS attacks, network hacks rampant in oil and gas industry; Will Cloud Computing Kill Privacy?

Will Cloud Computing Kill Privacy? | Study: CISOs Keep Breach Costs Lower

Network World Compliance Alert

Forward this to a Friend >>>


DDoS attacks, network hacks rampant in oil and gas industry, other infrastructure sectors
Massive denial-of-service attacks and infiltration of corporate networks by attackers is a common experience for companies in critical infrastructure sectors, including financial services, energy, water, transportation and telecom. Read More


RESOURCE COMPLIMENTS OF: IBM NWW


Improving the security of web applications starts by building software securely. IBM Rational AppScan is a suite of Web application vulnerability scanners that include dynamic and static analysis capabilities. Now you can engage more testers earlier in the development cycle. Try it for yourself. Download an evaluation copy of IBM Rational AppScan Click to continue

WHITE PAPER: IBM NWW

Increasing Energy Efficiency with x86 Servers
According to the Robert Francis Group, power efficiency will be the number one issue for IT executives for the next decade, at least. Fortunately, the combination of IBM BladeCenter Systems with the new Intel® XeonĂ’ 5500 Series processors provide the best combination of value, performance, and reliability. Download the white paper to see how. Read More

Will Cloud Computing Kill Privacy?
As cloud computing speeds ahead, privacy protections are too often being left in the dust. Read More

Study: CISOs Keep Breach Costs Lower
The latest "Cost of a Data Breach" survey from the Ponemon Institute finds companies with a CISO are better able to handle loss of sensitive information. Read More

Study: Hacking Passwords Easy As 123456
If you are using "123456" as your password it is past time to stop. Same if you are using the always popular "Password" to protect your account. Those easy-to-hack passwords were the top and fourth most-popular from among 32 million hacked from RockYou.com, a new study finds. Read More

Informing victims of identity theft
Until recently, information assurance (IA) personnel and attorneys specializing in this area of the law have had to search for the appropriate governing laws for each jurisdiction. In this column, I review a valuable resource for locating the laws which apply to disclosure of personally identifiable information (PII) in each state in the United States and internationally. Read More


WHITE PAPER: Tripwire

FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process. Click here.

Bugs and Fixes: Adobe Reader, Acrobat Come Under Fire
Adobe product security took another hit recently when reports surfaced of a zero-day attack against a critical vulnerability in the ubiquitous Adobe Reader. Read More

Leading voice encryption programs hacked in minutes
Most voice encryption systems can be tapped in minutes by installing a voice-recording Trojan on the target computer, a security researcher has confirmed after testing a range of well-known products. Read More

When standards bodies are the cyber threat
Believe it or not, some practices of the groups charged with producing security standards represent cyber threats in their own right. As government and industry increasingly collaborate to enhance cyber security, it is critical these practices be considered as part of the overall cyber security framework. Read More

Apple security threats exaggerated, report reveals
Apple's desktop computers experience little malware, a review of 2009 has found, but this is partly because attacks are starting to move to the company's other platforms such as the iPhone. Read More


WHITE PAPER: Data Domain

VMware Data Backup and Recovery Best Practices
VMware offers extraordinary benefits, but it can come at the cost of extra storage, backup resources and administrative challenges. Data Domain deduplication storage offers a way out by reducing redundant data across VMware data backups, operating at disk speeds, and providing cost-effective replication for fast DR using backup images. Click here to learn more.

Companies need more IT education to stop cyber crime
The cases of information security breaches in UK are on the rise, according to an analysis of actual data compromise cases by computer security and forensics consulting firm 7Safe and the University of Bedfordshire. Read More

Report: Flawed Apps Increasingly Under the DDoS Gun
A report from the CYBER SECURITY Forum Initiative (CSFI) offers further evidence that botnet herders are getting a bigger bang out of distributed denial-of-service (DDoS) attacks by targeting security holes at layer 7, more commonly known as the application layer. Read More

Cisco, NetApp, VMware team up on virtualization security
Cisco, NetApp and VMware announced a project to improve the security of virtualization deployments, with a focus on isolating applications that use the same physical network, server and storage resources in multi-tenant systems. Read More

Virus comes back from dead to hit hard drives
A 'prank' worm that started as an attack targeted at an off-road Slovakian motorcycle club has escaped beyond its intended victims and started wrecking hard disks as far away as the US. Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Are two routers enough to study for the CCNA? On Microsoft Subnet: AxCrypt: Open Source tool for encrypting files; On Google Subnet Google's reports blockbuster Q4, modest FY09.

SLIDESHOWS

Gotta start somewhere
What were the first products from today's biggest tech companies? Take the quiz.

2010's 25 geekiest 25th anniversaries
Our fourth annual compilation of the current year's most notable technology-related 25th anniversaries.

MOST-READ STORIES

  1. IBM, researchers to develop controversial lithium air battery
  2. Did Apple's iPad debut put a choke-hold on the Internet?
  3. Facebook and Twitter? Why not just put a gun to your head?
  4. Apple's iPad: can it rise to enterprise IT demands?
  5. FCC probes Google, T-Mobile for termination fees
  6. Free software embraced by CIOs
  7. 12 years of big-time Apple innovations
  8. Cisco announces changes to CCNP
  9. The Apple iPad specifications: three models starting at $499
  10. The networks of iPad

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments:

Post a Comment