Tuesday, January 26, 2010

Informing victims of identity theft

How to solve Rubik's Cube without peeling the stickers | Data breach costs top $200 per customer record

Network World Security Strategies Alert

Forward this to a Friend >>>


Informing victims of identity theft
Until recently, information assurance (IA) personnel and attorneys specializing in this area of the law have had to search for the appropriate governing laws for each jurisdiction. In this column, I review a valuable resource for locating the laws which apply to disclosure of personally identifiable information (PII) in each state in the United States and internationally. Read More


WHITE PAPER: WatchGuard

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.

WEBCAST: Oracle

Consolidate Your Servers and Storage to Lower Costs with Oracle Database 11g
Hear from Oracle experts on how consolidating your servers and storage onto a grid running Oracle RAC and Automatic Storage Management can help provide continuous uptime and on-demand scalability at lowest cost. Register Today

How to solve Rubik's Cube without peeling the stickers
Happy birthday to the Rubik's Cube, which was launched in 1980 (invented in 1974, but licensed by Ideal in 1980) and began a craze of goofy kids like yours truly (I was 11 or 12 at the time) trying to impress people with their cube-solving skills. For most people, "solving" the cube meant mixing up the cube and then peeling the stickers off and re-attaching them to claim a victory. Not so for me... Read More

Data breach costs top $200 per customer record
The cost of a data breach rose last year to $204 per customer record, according to the Ponemon Institute. The average total cost of a data breach rose from $6.65 million in 2008 to $6.75 million in 2009. Read More

How will NASA defend Earth against killer asteroids and comets?
Combinations of space- and ground-based telescopes may be the most economically palpable defenses NASA can mount against asteroids and comets heading toward Earth, but there are more advanced defenses involving spacecraft and nuclear Read More


WHITE PAPER: Quest Software

Linux and Unix in Your Environment? Don't Leave Security to Chance
Most businesses today rely on the stability and power of Linux or Unix in their data centers. However, these venerable platforms also create some compliance and security challenges.In this white paper, you'll learn to get the most from your Linux or Unix environment, while ensuring your data is safe and secure. Learn More

Netgear targets SMB market with new security tool
Netgear's new security appliance takes on SMB stalwarts such as Fortinet and Barracuda by including key functions of antispam, antimalware, and Web content filtering into a single unit combining easy deployment and budget-preserving pricing. Read More

How we tested the Netgear STM600 security appliance
We tested the STM600 over a one-month period for anti-spam effectiveness, Web security and email configuration and features, and performance. Read More

China rejects accusations on Google hack, Internet freedom
China on Monday dismissed accusations of any official involvement in hacking attacks on Google and other U.S. companies, adding to tension between the two countries over the issue. Read More


WHITE PAPER: Trend Micro

Securing Virtualized Data Centers - ebook
The appeal of the cost savings, flexible capacity, and failover that virtualization enables is undeniable. The big question is can today's datacenter balance this increased flexibility with the need to maintain security policies and control over applications, along with the ability to prove compliance? This ebook provides the answers to critical virtualization security questions. Read Now

HP unveils extensive security services package
HP Monday announced an extensive security-services portfolio that includes more than 90 basic offerings for application, identity and access management security to business continuity, cloud computing and managed services aimed at businesses and government. Read More

Stop 11 Hidden Security Threats
Do you know how to guard against scareware? How about Trojan horse text messages? Or social network data harvesting? Malicious hackers are a resourceful bunch, and their methods continually evolve to target the ways we use our computers now. New attack techniques allow bad guys to stay one step ahead of security software and to get the better of even cautious and well-informed PC users. Read More

Military wants protection from laser weapons
The US military, one of the world's largest developers of laser-based weapons is looking to develop technology that protects its own systems from the same weapons.  Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Are two routers enough to study for the CCNA? On Microsoft Subnet: AxCrypt: Open Source tool for encrypting files; On Google Subnet Google's reports blockbuster Q4, modest FY09.

SLIDESHOWS

Gotta start somewhere
What were the first products from today's biggest tech companies? Take the quiz.

2010's 25 geekiest 25th anniversaries
Our fourth annual compilation of the current year's most notable technology-related 25th anniversaries.

MOST-READ STORIES

  1. Reports: iPhone 4G rumors heat up
  2. Verizon Wireless slashes rates for unlimited voice
  3. 40/100G Ethernet transceiver market to reach half billion
  4. IE8 limits SSL VPN options for Cisco ASA users
  5. Microsoft's Ballmer: We're staying in China
  6. Facebook unleashes lawyers on Web 2.0 Suicide Machine
  7. New BlackBerrys on the horizon
  8. Google's stance on China shatters security inhibitions
  9. Csico ASA takes on botnets
  10. EFF to public: Urge the FCC to close net neutrality 'loophole'

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments:

Post a Comment