Search This Blog

Thursday, July 08, 2010

Are your IT folks snooping your protected data?

InfoWorld review: Microsoft ADFS 2.0 and Forefront Identity Manager 2010 | 'Caught on Tape: Hoisted by His Own Petard Edition'

Network World Security

Forward this to a Friend >>>


Are your IT folks snooping your protected data?
In a survey of IT professionals published Wedneday, 67% of respondents admitted having accessed information that was not relevant to their role, and 41% admitted abusing administrative passwords to snoop on sensitive or confidential information. Read More


WHITE PAPER: Websense, Inc.

Regulatory Compliance: Value of Data Security Solutions
Amendments to the Information Technology Act, 2000, have created additional and more stringent compliance requirements relating to cyber security, highlighting more than ever the value of data security solutions. Read More Now

WHITE PAPER: Websense, Inc.

TRITON™ Securing the Borderless Enterprise
In an industry first, Websense® has released TRITON™, a security solution that is fully integrated into one single platform with a single management interface and unified content analysis across Web, data and email. Read More

InfoWorld review: Microsoft ADFS 2.0 and Forefront Identity Manager 2010
Extensible cross-domain user authentication and automated user rights management highlight these powerful tools Read More

'Caught on Tape: Hoisted by His Own Petard Edition'
There's a right way and a wrong way to get the most from your home security technology. Not too long ago we wrote about an apartment dweller who achieved spectacular results from deploying a do-it-yourself video surveillance system after being victimized by a burglary. That's the right way. Read More

Apple says 400 iTunes accounts hit with fraudulent purchases
Apple has banned a developer from its App Store after fraudulent purchases of his applications were made from around 400 accounts, it said in a statement. Read More


WHITE PAPER: Qualys Inc.

12-point checklist outlines key considerations
Discover a 12-point checklist for choosing the best vulnerability management solution for your organization. Read now!

NASA's future Mars rover will be better equipped to find Martian life
NASA says its next generation Mars rover, Curiosity, will feature X-ray equipment that will let it more rapidly identify areas on the red planet that may have Read More

Inside the Celtics' infosecurity playbook
The Boston Celtics' VP of technology explains how using the MacBook Pro and cloud-based services helped improve the franchise's IT security. Read More

Bradley Manning charged with leaking Iraq death video
The US intelligence specialist arrested in June for sending to the Wikileaks website sensational footage of US helicopters firing on civilians in Iraq has been formally charged by US authorities. Read More


DOWNLOAD: Qualys Inc.

Security & Compliance Suite Trial
QualysGuard Security & Compliance Suite Trial The 14-day Trial includes: • Unlimited network mapping and discovery • Unlimited network perimeter scans • PCI Compliance scanning • Web application security scanning • IT security policy creation, scanning and reporting Learn More!

Info Commissioner launches new rules for online privacy
The Information Commissioner's Office has launched new guidelines for ensuring the privacy of personal information online. Read More

Apple pulls iPhone apps after rival devs claim fraud
Apple pulled a large number of apps created by a Vietnamese iPhone developer after claims by competitors that he had pushed his software to the top of the best seller list by purchasing them with stolen credit cards. Read More

Atlanta Has Dubious Honor of Highest Malware Infection Rate
New York and Los Angeles are major metropolitan areas with exponentially larger populations than most other US cities, so they lead the way for total volume of malware infections. If you break the infection rate down per capita based on population, though, Atlanta comes out on top (or is it on the bottom?) of the heap with the highest malware infection rate. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

Quiz: Do you know IT security?
Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more.

Your Next Laptop: Concept Designs Point the Way
Tomorrow's models may roll up, sport multiple screens or be repositionable, Transformer-style.

MOST-READ STORIES

  1. Microsoft accuses Apple, Google of attempted privacy murder
  2. Secrecy of cloud computing providers raise IT security risks
  3. Mozilla overhauls UI for Firefox 4 beta
  4. Many companies distributing open source software don't know it
  5. Secret Google tricks: How to search smarter
  6. Cisco wants to be the standard
  7. Honeypots for hacker detection
  8. Microsoft offers Windows 7, Office 2010 via download stores
  9. Singapore bank suffers massive IT failure
  10. Suspicious Facebook app attracts nearly 300,000 fans

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: