Monday, November 15, 2010

Obama may toughen Internet privacy rules, report says

Best practices for SIEM deployments | Phishing Attack Targets Merchant Accounts

Network World Security

Forward this to a Friend >>>


Obama may toughen Internet privacy rules, report says
The Obama administration is reportedly considering plans to step up policing of Internet privacy issues and to establish a new position to direct the effort. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Websense, Inc.

Buyers Guide to Data Loss Prevention Solutions
This guide provides a list of recommended features and capabilities for buyers to consider when purchasing a DLP solution. Buyers can also use this guide to develop requests for proposals, as well as to help differentiate one vendor's products from another during demonstrations and proof-of-concepts. Read More

Best practices for SIEM deployments
The 2010 Data Breach Investigations Report published by the Verizon Business RISK Team has a shocking statistic about the effectiveness of log analysis in helping organizations discover that they've been a victim of a security breach. According to Verizon, logs are available in nearly 90% of the breaches they've investigated, but effective in discovering the breach less than 5% of the time. This article outlines some best practices for deploying a security information event management (SIEM) solution to put those logs to better use. Read More

Phishing Attack Targets Merchant Accounts
The point of many phishing scams is to gain access to bank or credit account information for financial gain. So, it makes sense to target users or accounts with the highest odds of containing substantial amounts of money. That explains a new phishing attack reported by AppRiver which takes aim at customers of Global Payments. Read More

Bugs & Fixes: Beware OS X 10.6.5 and PGP WDE protected drive
If you are using PGP Whole Disk Encryption, beware of updating to Mac OS X 10.6.5. PGP Technical Support has issued the following alert: Read More


WHITE PAPER: Watchguard

Unified Threat Management - Market Review
Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming. Read now!

Facebook API flaw discovered
Social-networking services provider Sendible says it's uncovered a major flaw in how Facebook works and is cooperating with Facebook to fix the issue. Read More

Sarah Palin hacker Kernell gets one-year sentence
The former college student who guessed his way into Sarah Palin's Yahoo e-mail account during the 2008 U.S. presidential election was sentenced to a year and a day in prison Friday, according to published reports. Read More

Satellite moved to die a quicker death, reduce space junk
Satellite burns fuel, repositioned to burn up quickerA company operating an environmental monitoring satellite says it has moved one of its spacecraft into a position closer to earth and depleted its propellant with the idea that it will not add to the space Read More


WHITE PAPER: Trend Micro

Defending Against Spyware
The startling growth and deceptive methods of spyware can be easily attributed to profit motives. Spyware developers make money from the information that their software silently collects from unsuspecting users. Learn how to protect your information. Read More

Is there free stuff for online security? Yes!
Security software is a real free-for-all these days. Read More

Privacy Commissioner highlights flaws in telco bill
The Office of Australian Information Commissioner has warned that potential gaps exist in the privacy safeguards in the Federal Government's proposed Telecommunications Interception and Intelligence Services Legislation Amendment Bill 2010. Read More

Amazon pulls pedophile how-to manual
The self-published e-book had been on Amazon since Oct. 28 without a ripple or significant sales. That changed dramatically yesterday when word of its availability raced across the Internet, generating boycott threats, and reportedly launching the title to number 80 on Amazon's bestseller list. A statement from Amazon initially indicated that the company would stand by the book sale on free-speech grounds, but the title is no longer available on its site. Read More

5 Tips for the New Tech Support Pro
There are two types of tech support professionals. There's the one who, responding to a call for help, brusquely shoves the individual aside, fixes the issue, then leaves without saying a word. Or there's the type who takes time and understands that computers are something the client simply doesn't get. Read More

New Stuxnet clues suggest sabotage of Iran's uranium enrichment program
Researchers have uncovered new clues that the Stuxnet worm may have been created to sabotage Iranian attempts to turn uranium into atomic bomb-grade fuel. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Microsoft Windows after 25 years: A visual history
More than nine out of 10 computers run some version of Windows. But no one could have predicted that would be the case when Windows 1.0 launched 25 years ago as a graphical front end for MS-DOS. Here's a look at Windows through the years and some thoughts on what the future might hold.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Traveler to TSA: If you touch my junk, I'll have you arrested
  2. Microsoft breaks petaflop barrier, loses Top 500 spot to Linux
  3. Cisco apps for the iPhone and iPad
  4. Best networking tweaks for Windows Server, Vista and XP
  5. Inside an alleged iPad killer: the Samsung Galaxy Tab
  6. Researchers take down Koobface servers
  7. Ex-Apple 'grip of death' exec lands at Cisco
  8. Man loses $20 million after taking laptop for repair
  9. What's at the core of Cisco's plight?
  10. Russian Armenian botnet suspect raked in €100,00 a month

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment