Search This Blog

Friday, May 13, 2011

US senators: Corporate data breach reporting is inconsistent and unreliable

Do-not-track me! | White House delivers cybersecurity legislation

Network World Security

Forward this to a Friend >>>


US senators: Corporate data breach reporting is inconsistent and unreliable
Cybersecurity breaches need to be made public in a more proactive and efficient way.  That was the crux of a letter Senator John Rockefeller IV (D-W.Va.) and four other senators today sent to the US Securities and Exchange Commission (SEC) asking the agency to bolster its corporate breach notification requirements. Read More


WHITE PAPER: Dell

Foundations of Security Information Management
This guide examines the details of each of these processes and provides best practices to build a foundation for SIM. Learn more.

WHITE PAPER: HP

10 Things to Know about Deduplication
You as an IT manager want simple, cost-effective solutions for your complex IT challenges. HP kept this in mind while designing StoreOnce. New technologies, such as deduplication can be difficult to understand but StoreOnce powered by Intel Xeon® processor 5500 series makes it simple. Read More!

Do-not-track me!
In just one week, privacy advocates have seen two major proposals to promote consumer privacy on the Internet. In California, SB-761, a "Do-Not-Track" bill regulating tracking cookies, passed through committee clearing a major hurdle to adoption. Simultaneously, Sen Rockefeller introduced a very similar bill in the US Senate. Both bills would require companies to honor a "Do-Not-Track" preference set by consumers, usually as a browser setting. The bills represent a significant step forward in online privacy and should be strongly supported by voters. Read More

White House delivers cybersecurity legislation
The White House today sent its cybersecurity legislation to Capitol Hill, asking for changes in the law that will give the Dept. of Homeland Security more authority and duties in overseeing both private-sector and government networks. The White House is also asking for a national data-breach law that would supercede the patchwork of state data-breach laws now in place around the country. Read More

Cloud-based security as a service: It's catching on and here's why
When technology manager Lincoln Cannon wants to give his company's employees and business partners controlled access to various internal resources or cloud-based services the company uses, he goes to one cloud-based single sign-on security service to assign access privileges. Read More


WHITE PAPER: Splice Communications

The Benefits of Outsourcing Telecom Management
Choosing the right network solutions provider (NSP) will help businesses improve network reliability, service quality, operating efficiency, billing accuracy and better allocation of resources – all reducing the total cost of ownership of your network infrastructure. Many companies have realized the benefits of working with an NSP. Read now!

Windows 7's malware infection rate climbs, XP's falls
Data released today by Microsoft showed that Windows 7's malware infection rate climbed by more than 30% during the second half of 2010, even as the infection rate of the 10-year-old Windows XP fell by more than 20%. Read More

Businesses need to look at security as a military operation
LAS VEGAS -- Businesses need to look at security as a military exercise and can benefit from strategies that have proved useful in battle, a former military security expert told an Interop audience this week. Read More

Google engineers deny Chrome hack exploited browser's code
Several Google security engineers have countered claims that a French security company found a vulnerability in Chrome that could let attackers hijack Windows PCs running the company's browser. Read More


WEBCAST: CA Technologies

Tips for Safer P2V Migration
Join this webcast, Tuesday, June 7, 2011, 1:00 PM EDT, to learn the best practices for post implementation of virtualized servers in your environment. Discover what challenges to look out for and how to prepare to avoid pitfalls ensuring total protection for your systems, applications and data. Learn More

Facebook denies privacy breach allegations by Symantec
Facebook today denied that it may have accidentally exposed personal user data to advertisers and other third parties for several years. Read More

How Google will Search & Destroy your privacy, interview with author Scott Cleland
Scott Cleland is said to be "the world's leading Google critic." He's testified about Google in front on Congress and runs GoogleMonitor.com, Googleopoly.net, and Precursor. Read More

Windows malware threatens bank accounts
Web access security provider Trusteer has identified a Microsoft Windows malware platform that it says has "morphed" into a threat that attacks North American financial institutions and their customer accounts. The trojan, dubbed "Sunspot," has been in circulation for a while but only recently developed financial fraud capabilities, according to a blog post today by Trusteer's Chief Technology... Read More

Apple, Google execs squirm before Senate privacy panel
Executives of Google and Apple were called to task for mistakes made in how they protect the privacy of consumers using location-based applications on their smartphones and tablets at a U.S. Senate subcommittee hearing Tuesday. Apple had to admit to a glitch in the iOS for Apple iPhones and iPads that stored location information when location services were supposedly blocked, and Google had to admit... Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a 5-day Microsoft Licensing Tricks class teaching negotiation tips; a Polycom system. From Cisco Subnet: 15 copies of Cisco Unity books. Enter here.

SLIDESHOWS

So you think you know networking?
Network World has been around now for 25 years, and in that time the technology it covers has changed dramatically. It's been quite a ride. Here's a brief quiz to test your knowledge of some of what's been happening over that time.

MOST-READ STORIES

  1. Google launches Chrome OS, says Windows is 'torturing users'
  2. Experimental broadband management app could keep ISPs honest
  3. Hot products at Interop
  4. Chrome OS: 10 things you can (and can't) do with the Google PC
  5. John Chambers on the network
  6. 25 ways IT will morph in the next 25 years
  7. HP takes swipes at Cisco on Interop stage
  8. Windows malware threatens bank accounts
  9. The rising use of SSL raises new risks
  10. Smartphones attract organized, international, profit-driven scammers

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: