Thursday, December 02, 2010

FTC wants "Do Not Track" feature among wide-ranging online privacy changes

Is a next-generation firewall in your future? | Are IT Vendors Getting a "Free Pass" On Cyber Security?

Network World Security

Forward this to a Friend >>>


FTC wants "Do Not Track" feature among wide-ranging online privacy changes
FTC lays down online privacy protection frameworkLet the arguments begin!  What should be done with the vast amounts of personal information available online? The Federal Trade Commission is trying to address that critical issue and today issued a wide-ranging, preliminary report on what it wants to see the online industry do to protect basic privacy. Read More


RESOURCE COMPLIMENTS OF: AccelOps

How is your SIEM silo'd– what's missing?
Inundated with logs, alert noise and admin tasks. Lack usability, coverage, context and results. AccelOps goes beyond SIEM for proactive monitoring, expedited incident analysis, report automation and compliance. Whether seeking or upgrading your SIEM, or exploring SOC/NOC convergence, experience AccelOps' difference with our 14-day trial download.

E-BOOK: Palo Alto Networks

Get the "Next-Generation Firewalls for Dummies" Book
This book provides an overview of next-gen firewalls. Get your copy to find out: How Enterprise 2.0 applications create new risks for your organization? Why traditional firewalls can't protect your network? How next-generation firewalls stand apart from other security solutions? Click to continue

Is a next-generation firewall in your future?
The traditional port-based enterprise firewall, now looking less like a guard and more like a pit stop for Internet applications racing in through the often open ports 80 and 443, is slowly losing out to a new generation of brawny, fast, intelligent firewalls. Read More

Are IT Vendors Getting a "Free Pass" On Cyber Security?
Many critical infrastructure organizations perform haphazard IT vendor security audits at bestBefore buying an old house, most people do a thorough home inspection to make sure that plumbing, heating, and electricity infrastructure is safe and stable. When purchasing a car for a new driver, many parents check a vehicle's crash test rating. These actions are simply common sense due diligence since we want to make sure that our homes and children are safe. Read More


WHITE PAPER: Tripwire

Data Protection 2.0: It's Not Just Names and Numbers Anymore
Data Protection 2.0: It's Not Just Names and Numbers Anymore Meet this data protection challenge head on with a new way to categorize sensitive data that helps you reduce data breach risk and take more control of your most critical assets. Discover how. Read more!

U.S. tech lead at risk, says Obama's top scientist
Nobel Prize winner and U.S. Secretary of Energy Steven Chu Tuesday bluntly warned that the U.S. is in danger of losing its leadership in the development and export of high technology products. Read More

WikiLeaks is not the actual problem
Another day, another quarter of a million confidential government documents released via WikiLeaks. Read More


WHITE PAPER: IBM

Addressing the Complexities of Remote Data Protection
This white paper reviews the factors that can make data protection and recovery in remote offices a complicated problem and describes the range of technology options available, explaining the benefits and shortcomings of each in the context of remote offices. Read Now

Top Secret! Keep Your E-Mail Private and Secure
E-mail is one of the most widely used forms of communication today. Estimates from May 2009 suggest that around 250 billion--with a "B"--e-mails are sent every day. That equates to more than 2.8 million e-mail messages per second, and some of them are not even spam. Read More

Cloud increasingly being used by cyber criminals
By way of example, O'Connor said cyber criminals could use the Cloud to secretly store and distribute child abuse material for commercial purposes. Read More

Feds draw a bead on Russian behind Mega-D botnet
An Internet ring hawking counterfeit male-enhancement remedies, phony Rolexes and generic pills with false FDA approval has led the FBI to a Russian believed to be behind the Mega-D botnet. Read More

What you should know about Next Generation Firewalls
So what is the so-called Next Generation Firewall? Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

December goodies from the Subnets
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. EFF backs red-faced porn watchers vs. copyright trolls
  2. Inside the labs at Microsoft, HP and IBM
  3. Five reasons to be grumpy about 2010
  4. AT&T goes after copper wire thieves
  5. Cisco is expected to lose switching share in 2011
  6. P2P-based alternative to DNS hopes to challenge ICANN
  7. 10 weirdest celebrity tech ads
  8. Welcome to Browser War III, brought to you by open source
  9. Best networking tweaks for Linux
  10. Analyst finds flaws in Canon image verification system

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment