Wednesday, December 05, 2012

The do's and don'ts of safeguarding cloud-based data with encryption

  Big ad network that secretly sniffed users' online habits settles with FTC | 'Eurograbber' online banking scam netted $47 million
 
  Network World Security

Forward this to a Friend >>>


The do's and don'ts of safeguarding cloud-based data with encryption
One of the biggest stumbling blocks for companies contemplating entrusting a cloud-computing vendor with their data is the risk of unintended data exposure. A lot of data is sensitive. It might contain employees' financial information, patients' statutorily protected health information, other regulated information or proprietary intellectual property. Quite often, companies feel more control when they keep that sort of data in-house. But the risk that a cloud vendor might not handle your information as securely as you'd like can be mitigated. Read More


RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

RESOURCE COMPLIMENTS OF: LogMeIn

LogMeIn Central: Automate, Monitor and Manage PCs.
LogMeIn lets you Monitor and Manage PCs, deliver patches and updates to multiple PCS simultaneously. Central helps IT deliver seamless support that keeps employees productive and up and running. LogMeIn Central - automate routine tasks and do more. Free Trial

Big ad network that secretly sniffed users' online habits settles with FTC
The Federal Trade Commission today said it settled charges with a large online ad company the agency said secretly and illegally gathered data from millions of consumers who had looked up sensitive medical and financial issues ranging from fertility and incontinence to debt relief and personal bankruptcy. Read More

'Eurograbber' online banking scam netted $47 million
Over the past year, about 30,000 European banking customers were robbed of about 36 million euros -- that's about $47 million -- in an online banking scam that worked by exploiting mobile devices, according to security firms that stumbled into the operation. Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Android devices in U.S. face more malware attacks than PCs
Android devices are now attacked more often by malware than PCs, according to a report released Tuesday by a cyber security software maker. Read More

Surprise, surprise: McAfee not captured, he's 'safe'
If you didn't see this one coming - and many media outlets did not - you haven't been paying attention to the John McAfee saga. Read More


WHITE PAPER: Shoretel

Sophisticated Simplicity
The key is to build simplicity and ease of use into these solutions from Day 1. This white paper will demonstrate a clear path to UC simplicity, and to overall success of UC deployments. Learn more.

Father of SSL, Dr. Taher Elgamal, finds fast-moving IT projects in the Middle East
Often called the "father of SSL" due to his role as a cryptographer at Netscape Communications where in the mid-'90s he helped bring SSL encryption to the Web, Dr. Taher Elgamal now travels the Middle East as an IT consultant and project coordinator for business and government there. Read More

Raspberry Pi hack event sees Spooks team crowned winners
Team 'Spooks' have been crowned winners of a 24-hour hacking event focused solely on programming on the Raspberry Pi computer in Leeds, where 12 successful hacks were demonstrated. Read More

 
 
 

SLIDESHOWS

10 cloud predictions for 2013
2013 is the year that companies need to implement a serious cloud strategy that puts certain workloads in the public cloud and retains other workloads in-house.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Google Ingress: How to save the world with your Android phone
  2. Cisco Catalyst 6500 vs. Cisco Nexus 7000
  3. The 14 most influential smartphones ever
  4. Apple TV and iTunes update news for cord-cutters
  5. Microsoft may have some Windows Phone 8 momentum after all
  6. 2013 IT salaries: 15 titles getting the biggest pay raises
  7. 14 of the most useful Linux websites
  8. Apple iOS vs. Google Android: It comes down to security
  9. Turbo-charge your browser with these top add-ons
  10. Tablet smackdown: iPad vs Surface RT in the enterprise
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment