Wednesday, July 20, 2011

Are we getting too much information about data breaches?

20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!) | FBI Arrests 14 Hackers, But Anonymous Still Sailing & 'Seeking Shiny Booty'

Network World Security

Forward this to a Friend >>>


Are we getting too much information about data breaches?
Some 2,000 patients at Beth Israel Deaconess Medical Center in Boston have gotten one of those letters; you know, the one where a company or organization says, sorry, but we've let loose your personal information. This time, though, it would appear as though the potential for damage is virtually non-existent. And while I'm not suggesting that the hospital shouldn't have told its patients what happened,... Read More


WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
From IT geeks winning millions to Google mush-brain syndrome, 2011 is shaping up to be one wacky year Read More

FBI Arrests 14 Hackers, But Anonymous Still Sailing & 'Seeking Shiny Booty'
Technology, we love it; some of us can't live without it. But when it's used against us, we tend to hate it. One hacking crew was so fed up with "constant monitoring" that it injected 42 trojans into a German police GPS tracking system. LulzSec was resurrected to attack Murdoch; but a day later a huge FBI sweep in the U.S. has so far resulted in 14 people being arrested for allegedly being connected... Read More


WEBCAST: CA Technologies

Is Your DR Plan Truly Reliable?
No matter how you define a disaster, you need a strategy that provides protection, fast recovery and high availability of your systems, applications and data. Attend this webcast to learn about disaster recovery best practices and the wide range of technologies available to protect your organization. Learn More

LulzSec resurrected to attack Murdoch
The hacker group LulzSec came out of retirement Monday to hack Rupert Murdoch's The Sun website and threatened to reveal emails from Murdoch's News International. Read More

Microsoft posts $250K reward for Rustock botnet herders
Microsoft upped the ante on Monday in its months-long battle against the Rustock botnet by posting a $250,000 reward for information that leads to the arrest and conviction of the hackers who controlled the malware. Read More


WEBCAST: Riverbed

Faster Recovery for Windows Applications and Data
Are your backup & recovery plans up to snuff? Will you be able to restore critical systems & data quickly in the event of an outage? Learn valuable information on how to protect Windows applications & data in a distributed environment. Learn about challenges in protecting & restoring Exchange, SQL, & Windows file server, & more. Learn more!

Shift to virtualized environments shaking up security practices
The move to almost fully virtualized computing environments is driving a fresh approach to security in the enterprise, according to information technology security managers applying controls for VMware and Microsoft Hyper-V. Read More

Can you comply with court orders for data from the cloud?
The very nature of cloud storage, and one of its selling points, is that the cloud is dynamic. You only use what you need and shut down what you don't. Read More

Microsoft's Imagine Cup brings together students from around the world for technology competition
Innovative ideas seek to solve global humanitarian issues using everything from smart phones to cloud computing. Read More



GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

20 of the weirdest, wackiest and stupidest sci/tech stories of 2011 (so far!)
From IT geeks winning millions to Google mush-brain syndrome, 2011 is shaping up to be one wacky year.

MOST-READ STORIES

  1. 10 technologies that will change the world in the next 10 years
  2. Cisco to cut 6,500 jobs in cost-cutting blitz
  3. How dare Mercedes, Google exec use Apple's 'magical'?
  4. Anonymous takes aim at Google+ in more ways than one
  5. Getting at the real truth about IPv6
  6. Microsoft struggles to get Hyper-V drivers in Linux kernel
  7. 7 high-tech programs that want to pick your brain
  8. 10 hard truths IT must learn to accept
  9. Apple iOS still rules but Windows Phone 7 edges Android
  10. Apple could be next to ride on Android patent gravy train

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment