Thursday, January 21, 2010

IC3 includes identity theft in statistics

Microsoft Promises Early Patch for IE Zero-Day | Brain drain; admin failures threaten FCC role

Network World Security Strategies Alert

Forward this to a Friend >>>


IC3 includes identity theft in statistics
Identity theft has been a major and growing problem in the United States for several years. The Privacy Rights Clearinghouse, a "nonprofit consumer organization with a two-part mission -- consumer information and consumer advocacy" has an excellent survey page with pointers to years of published studies and point-form summaries of many of their findings. Read More


WHITE PAPER: WatchGuard

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

WEBCAST: HP

Need to Backup 10TB+ per Night?
Data deduplication based on grid technology has significant advantages over alternate methods. This video explains how enterprises can; backup 17TB per hour from a single VTL, eliminate human error through advanced automation, increase capacity as needed; save floor space with a smaller footprint, and lower energy costs, Learn more.

Microsoft Promises Early Patch for IE Zero-Day
Microsoft announced that it will release an out-of-band patch--meaning a patch that breaks the standard Patch Tuesday release cycle--to address the Internet Explorer flaw at the heart of the attacks in China against Google and other targets. The announcement was short on details, but Microsoft promised to provide more information on Wednesday. Read More

Brain drain; admin failures threaten FCC role
The Federal Communications Commission has brain drain and administration problems that could decrease its effectiveness at a time when advanced service technologies such as wireless and broadband present significant regulatory challenges. Read More


WHITE PAPER: Tripwire

FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process. Click here.

Security researcher IDs China link in Google hack
The malicious software used to steal information from companies such as Google contains code that links it to China, a security researcher said Tuesday Read More

Identity theft on the rise
Identity theft has been a major and growing problem in the United States for several years. The Privacy Rights Clearinghouse, a "nonprofit consumer organization with a two-part mission -- consumer information and consumer advocacy" has an excellent survey page with pointers to years of published studies and point-form summaries of many of their findings. Read More


WEBCAST: HP

Shifting Role of Network Managers
Webcast - More and more network managers are tasked with ensuring optimal application performance 24/7. No one wants to be in a position where end users are the first to notice application degradation. This webcast addresses the shifting role of network managers and provides best practices on fault and performance management. View today!

Predictions: Security Nightmares in 2010
Continuing our series of prediction-related podcasts for 2010, Ken Pappas from True North Security talks with Keith Shaw about the nightmares for IT that could occur this year, specifically in the health care and financial sectors. (14:00) Read More

Predictions: Cybercrime in 2010
As part of our series of prediction podcasts for 2010, Mike Paquette from Top Layer Security joins us for his fourth annual look back at 2009 predictions and gives us his 2010 predictions in the realm of cybercrime, which include the end of the trusted Web site and botnets getting worse. (18:49) Read More

Apple patches 12 Mac bugs in Flash, SSL
Apple on Tuesday patched 12 vulnerabilities in Leopard and Snow Leopard, including seven in Adobe Flash Player and one in the protocol used to secure Internet traffic. Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Cisco's borderless networking: the next big thing? On Microsoft Subnet: FreeNAS: Open Source Network Attached Storage; On Google Subnet Top 10 Open Source Rookies of the Year.

SLIDESHOWS

Gotta start somewhere
What were the first products from today's biggest tech companies? Take the quiz.

2010's 25 geekiest 25th anniversaries
Our fourth annual compilation of the current year's most notable technology-related 25th anniversaries.

MOST-READ STORIES

  1. Reports: iPhone 4G rumors heat up
  2. Verizon Wireless slashes rates for unlimited voice
  3. 40/100G Ethernet transceiver market to reach half billion
  4. IE8 limits SSL VPN options for Cisco ASA users
  5. Microsoft's Ballmer: We're staying in China
  6. Facebook unleashes lawyers on Web 2.0 Suicide Machine
  7. New BlackBerrys on the horizon
  8. Google's stance on China shatters security inhibitions
  9. Csico ASA takes on botnets
  10. EFF to public: Urge the FCC to close net neutrality 'loophole'

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments:

Post a Comment