Search This Blog

Monday, September 12, 2011

Warning: HIPAA has teeth and will bite over healthcare privacy blunders

Security roundup: How did 9/11 change IT?; Microsoft premature patching; HIPAA gets nasty | Whoops! Microsoft leaks patch info four days early

Network World Security

Forward this to a Friend >>>


Warning: HIPAA has teeth and will bite over healthcare privacy blunders
Healthcare organizations that are performing risk assessments as a way to craft patient-privacy policies might want to consider a new potential attack vector: federal regulators. Read More


WHITE PAPER: Riverbed

Case Study: Boston College
Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now

WHITE PAPER: VeriSign

DDoS: Finally Getting the Attention it Deserves
Verisign commissioned a market research study to investigate just how concerned IT decision makers are with the threat of DDoS attacks and what - if anything - they are doing to prepare for the increased threats in today's ever evolving cyber landscape. The results in this paper are very revealing. Read Now!

Security roundup: How did 9/11 change IT?; Microsoft premature patching; HIPAA gets nasty
The 10th anniversary of the infamous Sept. 11, 2001, terrorist attacks on America is prompting reflection on those who died on that day of mass murder, and what changed in our society because of it. Read More

Whoops! Microsoft leaks patch info four days early
Microsoft jumped the gun today by prematurely releasing information on all five of the security updates it plans to ship next Tuesday. Read More

Verizon fires workers who ran, participated in office football pool
If you thought taking part in the office Super Bowl pool or filling out a March madness bracket at work wasn't a big deal, think again - especially if you work at Verizon. The Taunton (Mass.) Gazette today reported that Verizon fired six workers and suspended 32 others for taking part in a Super Bowl pool this year. Read More


WHITE PAPER: Citrix Systems

Data Security via Desktop Virtualization
By centralizing virtual desktops and data, companies can protect sensitive information while giving users more flexibility and choice. Read More

Stop Using FTP! How to Transfer Files Securely
File Transfer Protocol (FTP), one of the oldest of Internet protocols, is still widely deployed, but it's the protocol sysadmins love to hate. Back in FTP's early days, the Internet was just a small network of computers where everyone knew everyone else, and FTP made little provision for security. Later revisions of the specification tried to add security features, but you can't fix an amputation... Read More

Credit card forger sentenced to 14 years
A man who sold phony credit cards online was sentenced to 14 years in prison and must pay more than $3 million after pleading guilty to wire fraud and identity theft. Read More

Cernam raises the bar for capturing and preserving online content as evidence
When it comes to using online content as evidence in a lawsuit, it's not sufficient to have a screen capture or other image of the content. Cernam is introducing new "capture and preserve" technology that precisely captures online content and its metadata and other properties so the content is valid as evidence. Read More


WHITE PAPER: GFI Software

Protecting Against the New Wave of Malware
Learn why traditional antivirus approaches don't work and why a new approach to endpoint security is required to better protect your company from malicious threats. Learn about the scope of the malware problem and strategies that can help you defend against evolving malware threats. Read now!

Hacker claims he can exploit Windows Update
The hacker who calls himself "Comodohacker" said this week that he could have used digital certificates stolen from a Dutch firm to issue fake updates to Windows PCs. Read More

9/11: Top lessons learned for disaster recovery
In the decade since the Sept. 11, 2001 terrorist attacks, physical security, human contingency planning and an evolution in technological capabilities have improved the odds that business can carry on during -- and after -- a disaster. Read More

Web paths are personal data says consumer group
A leading international consumer group has called on the United States Federal Trade Commission and the European Union's main body for data protection, the Article 29 Working Group, to reject self-regulation of online behavioral advertising. Read More

Apple strikes stolen SSL certificates from OS X
Apple today released an update to Mac OS X that blocks Safari users from reaching sites secured with certificates stolen from a Dutch company last summer. Read More



SLIDESHOWS

What do top CIOs make?
How high can a senior IT leader ascend in the ranks of a public company? High enough to rank among a company's most highly paid executives. High enough to enjoy perks such as company cars, financial planning services, and access to the corporate jet.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. ACLU: You have every right to photograph that cop
  2. Carnegie Mellon opens competitions aimed at building slick robots
  3. 9/11 anniversary: What our emergency response systems still can't do
  4. Microsoft inks licensing deals with two more Android makers
  5. OpenFlow inventor: Network provisioning will inevitably be automated
  6. Why I'm ignoring my W7 warning messages
  7. Hacker claims he can exploit Windows Update
  8. ATM hack gives cash on demand
  9. Behind the scenes of Wellesley College's desktop virtualization rollout
  10. 9/11 continues to influence IT strategy

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: