Tuesday, March 13, 2012

Know your rights: Identity theft victims express problems with reporting system

Microsoft's privacy plans in three minutes or less | First Amendment Be Damned: Out of control TSA threatens bloggers

Network World Security

Forward this to a Friend >>>


Know your rights: Identity theft victims express problems with reporting system
Unwanted pressure to buy protection services from credit reporting agencies and the inability to speak to a live person when reporting an identity theft situation were the two most annoying issues victims identified in a Federal Trade Commission report issued on the growing problem this week. In the news: What's up with these solar storms? Read More


WHITE PAPER: GFI Software

GFI VIPRE Antivirus Business 5.0
This free fully-functioning 30-day trial of GFI VIPRE Business is designed to optimize overall performance by melding antivirus and antispyware together into one powerful engine. Learn More

WHITE PAPER: Oracle

Copying Sensitive Data Into Non-Production Environments
Download this paper to learn data masking best practices and enable your organization to safely use production data for development, testing, and sharing with out-source or off-shore partners, without risking a sensitive data breach. Learn More!

Microsoft's privacy plans in three minutes or less
Microsoft continues to say all the right things as it moves even further into the new age of technology. However, what remains to be seen is whether the company will make good on the promises of its new, open approach to privacy. Read More

First Amendment Be Damned: Out of control TSA threatens bloggers
According to TSA Out of Our Pants, $1B of TSA nude body scanners were made worthless by the blogger's video showing how to "get anything through" the TSA body scanners. Read More

What privacy do you have left to lose? Beware the drone
Last week's column about The Google and its new privacy policy got quite a response, ranging from "I don't get it, what's the fuss?," through to "I don't care, I have nothing to hide," and "it's been pretty obvious for years where this was all heading but very few people bothered to sound the alarm ... until now when it's too late." Read More

Useful security threat data advisory tools
Check out these browser-based tools to keep up on the latest cyber security threats Read More


WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

DARPA wants on-demand satellite imagery for smartphones
The idea: provide small squads of soldiers the ability to receive near instantaneous imagery of their specific location directly from a satellite with the press of a button on their smartphone. Read More

In depth: What does APT really mean?
And what should companies do about truly persistent threats? Read More

5 signs that you've lost control over your cloud apps
CIOs are waking up to the reality that they've lost control over access to data stored in software-as-a-service applications purchased by other departments. Read More

Identity management in the cloud emerges as hot-button issue for CIOs
As Sallie Mae migrates some of its most important applications to the cloud, the nation's largest provider of college loans is keeping an eye on compliance. Read More


WHITE PAPER: Box

Content Sharing 2.0: The Road Ahead
The business value proposition of cloud-based content sharing is in lockstep with the most powerful drivers of IT and business today. Learn More!

Plugging a SaaS Access Hole
Our manager's company has a lot of sensitive data on Salesforce.com servers, and until now, we could access it from any device. Read More

SXSW: Privacy Concerns Grow Over Location-aware Apps
App developers are more concerned than ever about the privacy implications of apps that detect and store the physical locations of the people using the apps. Read More

Pwn2Own, Pwnium pay researchers $210K for browser bugs
Researchers last Friday unveiled zero-day vulnerabilities in Google's Chrome and Mozilla's Firefox during the final day of two hacking challenges that awarded $210,000 to contestants. Read More

Surveillance technology for investigations and crowd control
As the second-largest metropolitan area in the United States, Los Angeles is home to four million residents and the mecca for most of the entertainment industry's high-profile events. The almost constant stream of celebrity-infused happenings that require serious crowd control keeps the Los Angeles Police Department very busy. Read More



SLIDESHOWS

Useful security threat data advisory tools
Check out these browser-based tools to keep up on the latest cyber security threats.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Cisco rival Juniper put to the test
  2. Techies are spending a lot of time on PCs in our post-PC world
  3. iPhone 5 rumor rollup for the week ending March 9
  4. Could China easily take down U.S. military's refueling logistics in a cyberwar?
  5. Hackers shame IE9, Chrome, Firefox in Pwn2Own & Pwnium
  6. 5 signs you've lost control over your cloud apps
  7. 10 terrific apps for the new iPad
  8. Researchers can't identify programmers language used in Duqu, ask for help
  9. 5 ways Avaya can stave off irrelevancy
  10. FAQ: What you need to know about the 'new iPad'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment