Tuesday 19 April 2011

Verizon study: data breaches quintupled in 2010

Verizon's 12-step program for thwarting data breaches | Security firm to Facebook: Clean up your act

Network World Security

Forward this to a Friend >>>


Verizon study: data breaches quintupled in 2010
Criminals carried out more but smaller data thefts last year than in previous years, indicating a shift toward simpler exploits that run lower risk of punishment, according to Verizon's latest data breach report. Read More


WHITE PAPER: Dell

Elements of a Proactive Data Security Solution
See all the survey results along with more data security resources, including an expert Webcast outlining six vital security steps, in the security KnowledgeVault. Learn more.

WHITE PAPER: Sophos

Why Hackers have turned to Malicious JavaScript Attacks
Reaching unsuspecting users through the web is easy and effective and hackers now use sophisticated techniques—like injecting inline JavaScript—to spread malware. Learn more about this threat, how it works and how cybercriminals make money with these types of attacks. Read now.

Verizon's 12-step program for thwarting data breaches
Verizon's just-released "2011 Data Breach Investigations Report" says businesses could prevent  most data breaches if they stick to security principles that are cheap and easy to implement. Read More

Security firm to Facebook: Clean up your act
Facebook needs to make some simple, yet crucial, changes to secure users more effectively, according to security firm Sophos. Read More

VDI Security Comparison Citrix XenDesktop and VMWare View
Here's a head-to-head security comparison of XenDesktop 5 and View 4.6 from Cisco Security Expert blogger Jamey Heary. Read More


WHITE PAPER: PC Mall

Virtualization Pain Relievers
In these articles, Computerworld, Network World and their sister publications CIO and InfoWorld explain the nuances of storage virtualization, as well as explore the benefits and challenges. Read now!

Simulated cyber attack reveals EU flaws in coordination
Some 55 percent of national information technology agencies would not know who to contact in the event of a European Union-wide cyber attack. Read More

South Korea probes possible cyberattack on large bank
Authorities in South Korea are probing a large system failure at a popular bank, trying to determine whether the incident was an error or a cybercrime that could be repeated elsewhere in the country where business relies largely on electronic transactions. Read More

Iranian general accuses Siemens of helping U.S., Israel build Stuxnet
An Iranian military commander accused the German electronics giant Siemens with helping U.S. and Israeli teams craft the Stuxnet worm that attacked his country's nuclear facilities. Read More


WHITE PAPER: Netezza, an IBM Company

Oracle Exadata and Netezza TwinFin™ Compared
This ebook will provide the fundamental differences between the Netezza TwinFin® and Oracle Exadata solutions from the perspectives of query performance, simplicity of operation and value. The ebook will help you determine which solutions best meet your business needs and how to achieve optimal results from your data. Read now

India plans paper trail for electronic voting machines
India's Election Commission may give in to demands that its electronic voting machines should also have paper outputs of voting records to verify tallies. Read More

Event to put spotlight on SIP security
A major conference on SIP will address security concerns that service providers and their customers may have. Read More

Sourcefire takes intrusion prevention to masses with IPSx
Open-source security company Sourcefire announces an entry-level Intrusion Prevention System (IPS) to democratize the technology, wh ich is still seen as exclusively meant for large companies with experienced security teams. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a 5-day Microsoft Licensing Tricks class teaching negotiation tips; a Polycom system. From Cisco Subnet: 15 copies of Cisco Unity books. Enter here.

SLIDESHOWS

Internet2's Top 10 firsts and other achievements
As Internet 2 celebrates its 15th anniversary, here are 10 major achievements and firsts.

MOST-READ STORIES

  1. Asia out of IPv4 addresses
  2. Four things RIM's PlayBook got wrong
  3. Six Windows 7 nightmares (and how to fix them)
  4. Computer factories eat more energy than the devices they build
  5. Hacker 'handshake' hole found in common firewalls
  6. OpenFlow opens new doors for networks
  7. Red Hat becomes cloud service provider
  8. 10 must-have utilities for small networks
  9. Berners-Lee: Web access is a 'human right'
  10. Did you hear about the hacker who stole the open source code?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment