Friday, February 26, 2010

5 security missteps made in name of compliance

How to Stop P2P Data Breaches | 10 hot computer science schools (slideshow)

Network World Compliance Alert

Forward this to a Friend >>>


Five Security Missteps Made in the Name of Compliance
In the hurry to meet a regulatory compliance deadline, companies risk making some costly security mistakes. Here are five examples. Read More


WHITE PAPER: Tripwire

A Holistic Approach to Compliance Makes Business Sense
IT management has tremendous incentive to figure out a new, more effective and comprehensive approach to meeting information security and compliance goals. This webcast will explore those pain points, the solutions, and the best practices organizations should consider to make strategic information security an enabler of business value. Learn More!

WHITE PAPER: Eaton - NWW

10 Ways to Increase Power System Availability
This white paper discusses 10 such underutilized best practices for building and maintaining a highly available data center power infrastructure. Read Now

How to Stop P2P Data Breaches
The Federal Trade Commission (FTC) has notified hundreds of US businesses that their sensitive data is circulating freely on peer-to-peer (P2P) file sharing networks for all to see. While no company wants to have confidential information exposed to unauthorized users on the Web, many businesses, depending on the nature of the data being exposed, also fall under legal compliance mandates to safeguard the data. Read More

10 hot computer science schools (slideshow)
Leading universities report rising enrollment in computer-related courses Read More

Security B-Sides: Rise of the 'Anti-conference'
Next week's RSA 2010 conference will have some nearby competition. Here's the story of Security B-Sides as the conference alternative. Read More

How to Alert Connections of a Social Network Hack
You've been hit by a social network scam on Twitter and don't know how to warn your contacts? Mary Landesman of ScanSafe offers four simple, clear steps to help protect your contacts. Read More


WHITE PAPER: IBM NWW

Escaping PCI Purgatory
PCI compliance is a challenge for midsize and large companies alike, as there are four phases to meeting the PCI DSS requirements: assessment, remediation, compliance and maintenance. Read this white paper as IBM reveals five key 'sticking points' organizations have been facing on the path to PCI DSS compliance. Learn More

Experts: Developers Responsible for Programming Problems
A group of security luminaries lead by SANS Institute and MITRE are calling for software developers and vendors to shoulder the burden when it comes to programming mistakes in their products Read More

FTC seeks extensive information from firms being investigated for P2P breaches
Several companies being investigated by the FTC for inadvertently exposing customer and employee data on peer-to-peer networks, have been asked by the agency to submit extensive information on their data-collection, usage and protection practices. Read More

IBM: Vulnerabilities fell in 2009, but other risks abound
The number of software vulnerabilities fell overall in 2009, but the number of bugs in document readers and multimedia applications increased by 50 percent, according to IBM's annual X-Force Trend and Risk Report. Read More

Microsoft launches 'phone home' anti-piracy update
As promised, Microsoft has started offering Windows 7 users an update to the company's anti-piracy software via Windows Update. Read More


WHITE PAPER: Ultrium

Best Practices for Long-Term Data Retention
Disk-based solutions for data protection have opened up new storage options for organizations. The question should not be whether to choose disk or tape, but rather how to leverage both technologies to deploy a cost-effective tiered-storage architecture. This paper discusses the 5 best practices for backup and long-term data protection. Learn More

ATM Skimming: How to Recognize Card Fraud
Criminals are increasingly turning to card skimming as a profitable way to steal cash. Would you know what to look for at your local ATM? Read More

Microsoft recruited top notch guns for Waledac takedown
Four days ago, top-notch computer security researchers launched an assault on Waledac, a highly sophisticated botnet responsible for spreading spam and malicious software. Read More

School district faces lawsuit over Webcam spying claims
The MacBook's built-in iSight camera and microphone are awfully convenient for Skype phone calls and iChat video conferencing, but a more sinister potential use came to light this week with the allegation that a suburban Philadelphia school district used iSight cameras to spy on students at home. The FBI has launched an investigation to determine whether federal laws were broken. Read More

Attackers going after end users rather than servers
The Web traffic study also finds issues with botnets, corporate policies, and outdated browsers Read More

Cisco gaining mindshare in security, says research firm
A survey of 259 information security professionals shows Cisco gaining clout with them as a network-security provider, according to research firm TheInfoPro. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Forrester Research and Network World want to hear from you!
We are collaborating to conduct an on-line-based study focused around data center strategy. The survey should take approximately 12 to 15 minutes to complete. This is both a confidential and anonymous survey and your results will only be used in aggregate. As a special thankyou, all respondents will receive a free copy of the resulting research report from Forrester – a $500 value! Thank you for taking the time to fill out the survey.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

Videogame your way through the Olympics
If you're bored with (or inspired by) NBC's coverage of the games, there's always your PC or video game system that lets you feel like you're competing in these events.

The technology behind the Vancouver Olympic Games
Bell Canada is claiming the Vancouver 2010 Olympic network as the first IP-based converged network at any Olympic or Paralympic Games. It will be built to provide seamless telephone, wireless, radio and Internet communications services for fans, media, athletes and officials from around the world.

MOST-READ STORIES

  1. Students launch protest of AT&T coverage
  2. Hungry? How about an open source restaurant
  3. IE 6: Patch Tuesday won't be the same without you
  4. Why Palm can't be saved
  5. BlackBerry travel apps: 10 must-have downloads
  6. Microsoft: Cloud revenue to hit in a couple years
  7. Ten of the world's strangest social networks
  8. It lives! It lives! Original 'Rickroll' video returns to YouTube!
  9. Want a job? Get a computer science degree
  10. Cisco invests in virtualization security start-up

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment