The Curse of Cloud Security Seventh Annual Global Information Security Survey: Companies are clamoring for services in the cloud. But the biggest problem from a security perspective is that few understand what they're dealing with. (Second of a four-part series) Slideshow: 12 biggest data breaches of past 12 months Hackers and lost laptops put personal information at risk Healthcare organizations find security, privacy cures Healthcare organizations are energetically seeking cures for managing identity and security in fast-paced hospital environments to help physicians and nurses do their jobs more easily -- and to keep patient data safe. Companies Seek Social Networking's Promise, But Peril Social networking sites such as Twitter, Facebook and LinkedIn enhance collaboration but also make it easier than ever for your employees to share customer data and company secrets with outsiders (First of a four-part series). Data masking secures sensitive data in non-production environments Sensitive data is a part of every large organization's normal business practice. Allowing sensitive data from production applications to be copied and used for development and testing environments increases the potential for theft, loss or exposure -- thus increasing the organization's risk. Data masking is emerging as a best practice for obfuscating real data so it can be safely used in non-production environments. This helps organizations meet compliance requirements for PCI, HIPAA, GLBA and other data privacy regulations. Their phone, your headache Employees want IT to link their personal smartphones to email and other corporate resources, but how do you secure devices that house a mix of peronsal and corporate information? And what happens when those employees quit? Password Reset Email is New Facebook Virus Security researchers uncover spoof email with downloadable files that include the Trojan virus Bredolab. Survey: More Companies Hiring CSOs Even though the worst economic recessionin decades has compelled companies to spend less on outsourced security services and do more in-house, security budgets appear to be holding steady. And more of companies are employing a chief security officer. Five Things You Should Know About Windows 7 Security Microsoft says Windows 7 is the most secure version of the Windows operating system ever developed. Big deal, right? I am pretty sure that Microsoft has made that claim for every new version of Microsoft Windows in the past 15 years, and that it is a valid claim. Symantec ties DLP software to third-party security tools Symantec has updated its Data-Loss Prevention Suite so that if the software finds a data issue that needs fixing, it can apply third-party encryption and digital-rights management (DRM) controls to the problem. Privacy: Why Google Social Search Gives Me The Creeps Has Google started following us around? It's new Google Social Search feature, going live today, sure feels like it. And hints at what Google can do both for and to you with all the information it has collected. Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Network World on Twitter? You bet we are |
No comments:
Post a Comment