Search This Blog

Thursday, January 26, 2012

IT pros believe data breach harm assessment is more valuable than victim notification, study says

  Senate to Consider Cybersecurity Overhaul | What the drone invasion looks like
 
  Network World Security

Forward this to a Friend >>>


IT pros believe data breach harm assessment is more valuable than victim notification, study says
IT professionals believe that assessing the potential harm caused by data breaches is more useful to mitigating the effects of such incidents than notifying affected individuals, according to a survey published on the day the European Union's proposed a 24-hour deadline for data breach disclosures. Read More


WHITE PAPER: Quantum

Big Data: Managing Explosive Growth
Are you experiencing a data explosion? The trend toward leveraging Big Data for competitive advantage helps IT professionals successfully meet business goals. Learn how to reliably manage, store and access vast amounts of archived data while protecting it and keeping costs low. View Now

WHITE PAPER: NetSupport Inc

Reducing Hidden Operating Costs Through IT Asset Discovery
After reductions in headcount and procurements have been made, cost-cutting strategies are now turning to internal operations, and many IT decision makers are taking a closer look at indirect, or "soft," costs within these departments. Learn More

Senate to Consider Cybersecurity Overhaul
Majority leader Harry Reid is poised to bring long-debated cybersecurity legislation to floor in hopes of broad bipartisan support, according to comments from his senior aide at the State of the Net conference. Read More

What the drone invasion looks like
Unmanned aircraft are proliferating; this is what they look like Read More

Teleconferencing vendors defend product security features
Teleconferencing vendors say they're trying to strike the right balance between security and usability after security researchers found they could dial in to the conference lines of major companies and manipulate video cameras to spy on boardrooms. Read More


WHITE PAPER: NetIQ

Streamlining IT Operations with Business Service Management
This IDC Technology Spotlight examines the benefits of a business service management practice and tools in response to IT environments becoming more dynamic and complex due to the increased use of virtualization, cloud, SOA, and n-tier application architectures. Learn More

Is Security An Afterthought For NoSQL?
There has been a not so silent debate going on in the security world about the security posture of the NoSQL database products. Read More

Proposed EU data protection rules include right to be forgotten
New proposals for Europe's data-protection law would see companies facing fines of up to two percent of their global turnover if they breach the rules. Read More

Intego: 2011 offered bumper crop of Mac malware
One of Apple's chief advantages in the personal computing market has been that its Mac computers have been relatively impervious to viruses and malware, at least when compared to Windows-based PCs. But that advantage may have been more difficult to maintain in 2011--at least, according to a new report from security firm Intego. Read More


WEBCAST: Radware

Control the Cloud Like You Do Your Own Infrastructure
Industry analyst Robin Layland joins Alan Murphy from F5 Networks and Greg Smith from Citrix to explore how an ADC can allow you to control your applications running in the cloud as effectively as you control them when they are running in your data center. Learn More

Final phase of Mass. data protection law kicks in March 1
All companies storing personal data on Massachusetts residents have until March 1 to ensure that their contractors, suppliers, technology providers and other third parties comply with a new provision of the state's data breach law. Read More

Accused Kelihos botmaster's former employer 'angered' at revelation
A security-related company that until late December employed the Russian developer who allegedly created the Kelihos botnet said today it was 'extremely disappointed and angered' at the revelation. Read More

2012's 25 Geekiest 25th Anniversaries
A look back at the most memorable events and products from 1987 Read More

Ten Things We Love and Hate about Windows Server 8
Read More

 
 
 

SLIDESHOWS

2012's 25 Geekiest 25th Anniversaries
Network World's 6th annual collection of the year's "geekiest anniversaries" this time includes the births of pioneering companies such as UUNet and NEXTEL; technologies like OS/2 and SPARC; television classics topped by "Star Trek: The Next Generation" and the first "Simpsons" shorts; disposable contact lenses; the first naked-eye supernova in four centuries; and, who could possibly forget The Woodstock of Physics?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Inside Apple's secret packaging room
  2. 2012's 25 geekiest 25th anniversaries
  3. Cloud activity to explode in 2012
  4. Google looks to speed up the Internet
  5. iPhone 5 rumor rollup for the week ending Jan. 20
  6. LTE spectrum: How much do the big carriers have?
  7. Fear the tablet: Cisco survey
  8. First look: Windows 8 breaks new ground
  9. U.S. government online security website hacked
  10. Stupid user tricks 6: IT idiocy loves company
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: