Search This Blog

Monday, December 06, 2010

How to squelch the security threat of digital copiers

Feds Tracking Americans' Credit Cards in Real Time Without a Warrant | Bruce Schneier: 'Cyberwar hotlines' needed

Network World Security

Forward this to a Friend >>>


How to squelch the security threat of digital copiers
Is there a hacker targeting your digital copier? The security hole that ubiquitous copy machines can create is a big one, albeit one most IT folks probably don't consider often enough. The Federal Trade Commission however has heard enough complaints about the copier security problem that earlier this year it started contacting copy machine makers and office supply stores about privacy concerns over the thousands of images that can potentially be... Read More


WEBCAST: Akamai Technologies

Increase Download Completion Rates
Join IDC for this live Webcast as new research on Electronic Software Delivery is revealed. Find out how to effectively monitor and deliver small and large downloads to ensure end user success and satisfaction. And because it's live, you can ask the experts questions specific to your environment. Register Today.

WHITE PAPER: Watchguard

10 questions to ask before you buy an anti‐spam solution
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

Feds Tracking Americans' Credit Cards in Real Time Without a Warrant
Federal law enforcement agencies have been tracking Americans in real-time using credit cards, loyalty cards and travel reservations without getting court orders for the "hotwatch."It should surprise very few to learn that federal law enforcement agencies track Americans without getting court orders, but this time the feds have been tracking U.S. residents using real-time surveillance of credit card transactions and travel reservations. Read More

Bruce Schneier: 'Cyberwar hotlines' needed
Security expert Bruce Schneier has called for governments to establish 'hotlines' between their cyber commands, much like the those betwen nuclear commands, to help them battle against cyber attacks. Read More


WHITE PAPER: Quest Software

Collecting Compliance Evidence: The Role of Event Logs
This Quest Software white paper discusses how to maximize the power of event logs. You'll learn about recent regulation changes, how your company can best prepare for an audit and the solution you need to address these issues. Read More

Companies slow to adopt NAC technology
Forrester has made a set of predictions for NAC technology in 2011 Read More

Top Security Predictions for 2011
Aside from the festivities of the holidays, one thing that always makes December special is the combination of reflecting on the year gone by, and looking ahead to what the next year might hold. It is filled with top 10 lists and predictions on every imaginable topic. Read More


WHITE PAPER: Watchguard

Unified Threat Management - Market Review
Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming. Read now!

Cisco's mixed security bag
Drives content segment in Q3, but down in network securityCisco propped up the content security market in Q3 with 30% sequential growth, while experiencing a down quarter in network security, according to new data from Infonetics. Overall, the network security market was flat from Q2 as more sales shift to content security, the firm found. Read More

Verizon 2010 Data Breach Report Is Eye Opening
48% of breaches caused by insiders with 90% of those being deliberate!The 2010 Verizon and U.S. Secret Service breach report is chock full of enlightening facts, figures and statistics. I highly recommend you read it cover to cover. It breaks down the breaches by demographic, threat agents, threat actions, attack difficulty and targeting, vertical, and time span. It also compares how PCI compliance affected the number and severity of breaches. You can grab it here www.verizonbusiness.com/go/2010databreachreport/ ... Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

December goodies from the Subnets
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Google caves in Street View 'trespassing' case, pays $1
  2. 2010's biggest security SNAFUs
  3. Is a next-generation firewall in your future?
  4. Microsoft quietly invests in IBM emulator TurboHercules
  5. From Pong to Furby, games and gadgets of holidays past
  6. So many Androids, so little time
  7. Microsoft gains cloud security certification ... six months after Google
  8. WikiLeaks.org downed by domain hosting service
  9. AVG free update bricks 64-bit Windows 7 PCs
  10. Open source IP PBX saves serious cash for Michigan CAT

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: