Friday, May 15, 2009

Inside a data leak audit; Mass network compromise cause of most online fraud

Implications of proposed Cybersecurity Act of 2009, Part 1; DMTF aims to clear the fog of managing cloud computing
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile


Sponsored by BMC Software
rule

Choosing the Best WLA Vendor for your Environment
Which vendor is leading the job scheduling pack? Find out in this Gartner report. Learn which company has the best vision for today and tomorrow and which vendor displays the strongest ability to execute on that vision. Get critical tips on finding the best workload automation platform for your organization.

rule

Spotlight Story
Inside a data leak audit

When the director of IT at a Boston-based, midsize pharmaceutical firm was first approached to participate in a data leakage audit, he was thrilled. He figured the audit would uncover a few weak spots in the company's data leak defenses and he would then be able to leverage the audit results into funding for additional security resources. Read full story

Related News:

Mass network compromise cause of most online fraud
Mass compromise of payment-card systems or retailers holding credit- and debit-card information is said to the primary cause of payment fraud-- not online attacks such as phishing -- according to a survey of 131 financial institutions that was published Tuesday.

Implications of proposed Cybersecurity Act of 2009, Part 1
Legislators mean well, but their proposals for regulation of areas that depend on technical expertise always make my hackles rise - even before I've read the details. One of these cases is the occasion for today's and our next columns.

DMTF aims to clear the fog of managing cloud computing
Many organizations are taking an interest in the cloud computing model. However, the fear of vendor lock-in and the lack of interoperability standards are making some companies hesitate. The Distributed Management Task Force (DMTF) is tackling the problem with a new incubator task force designed to develop a set of informational specifications for cloud resource management. These specifications could lead to interoperability standards within twelve months. to see what's in it for you.

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.


Evolution of Ethernet
Evolution of EthernetFrom 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

EMC's CSO Explains the Triple A's of Security Management
Roland Cloutier, EMC's Chief Security Officer shares his secrets for managing Authentication, Audit, Availability and security of the IT network infrastructure. Join us on Wednesday, June 3 at 2:00 p.m. ET/11:00 a.m. PT to find out how.
Register Now


Learn more at a free IT Roadmap Event
Get the latest - direct from Network World at the leading 1-day conference and expo devoted to Green IT best practices and even better solutions. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Qualify to attend free

 

May 15, 2009

TOP STORIES | MOST DUGG STORIES

  1. Domain name company cries croc tears over 'censorship'
  2. Why BlackBerry still beats iPhone for some
  3. Death of the mouse
  4. Leaked copies of Windows 7 RC contain Trojan
  5. RIM to bind BlackBerry to Cisco phones
  6. Top 7 reasons people quit Linux
  7. Citrix embraces Apple with iPhone virtualization
  8. Give users passwords they don't have to remember
  9. Cisco cool to Obama's tax loophole plan
  10. Use the Cisco restroom at your own risk

2009 Fave RavesNetwork World on Twitter: Get our tweets and stay plugged in to networking news

MOST-WATCHED VIDEO

  1. Notebook replaces trackpad with LCD panel

The Economics of WAN Optimization
Discover the benefits of a comprehensive WAN optimization platform that accelerates applications while lowering costs. Join us for this Live Webcast on Tuesday, June 2, 2009 at 1:00 p.m. ET/10:00 a.m. PT. Learn how you can lower costs and improve employee productivity.
Join this Webcast



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment