Friday, September 10, 2010

'Here you have' e-mail worm spreads quickly; Enterprise risk management 6-step program

Enterprise risk management: Get started in six steps | Symantec, Trend Micro rivalry heats up over antivirus tests, new products

Network World Compliance

Forward this to a Friend >>>


'Here you have' e-mail worm spreads quickly
Security experts warned Thursday of a fast-spreading e-mail worm, the first large outbreak of this type in nearly a decade. Read More


RESOURCE COMPLIMENTS OF: IBM


New research reveals that C-level executives feel good data protection efforts support organizational goals such as compliance, reputation, management or customer trust, but there is a lack of confidence in the ability to safeguard sensitive information. Sponsored by IBM, this webcast reveals the value of data protection. Click to continue

In this Issue


WHITE PAPER: Splunk

Troubleshooting Critical Applications
Troubleshooting many tiers across heterogeneous infrastructures is too complex and slow. With Splunk you can search centrally across all components of your applications to find and fix problems fast. Download this Guide to find out how you can meet or exceed service level expectations. Read now!

Enterprise risk management: Get started in six steps
Let's say your organization doesn't have a formal enterprise risk management program. If you're at a big company, ERM might seem daunting because of silos, inertia and so on. Read More

Symantec, Trend Micro rivalry heats up over antivirus tests, new products
A spitting match related to antivirus product tests has erupted between Symantec and Trend Micro, as each Wednesday unveiled the 2011 editions of their consumer desktop antimalware packages. Read More

Microsoft plans double-sized Patch Tuesday next week
Microsoft plans to issue nine security updates to patch 13 bugs in Windows, Office and its Web server software next week. Read More

Symantec updates Enterprise Vault, ties to Microsoft cloud apps
Symantec Tuesday unveiled updated storage and backup gear, giving Enterprise Vault 9.0 a way to integrate archiving and discovery-related legal requests with Microsoft's cloud-based Business Productivity Online Services. Read More

Onapsis to release ERP vulnerability testing suite
An information security company will soon release a tool that will allow companies to test their ERP (enterprise resource planning) software for security threats. Read More


WHITE PAPER: HP & Intel

The Business Value of Reservationless Storage
Reservationless storage streamlines the delivery of block-based storage capacity that is used for thin provisioning and snapshots. It requires less capacity over the life of the storage system and dramatically reduces stranded storage. This ESG report explains how reservationless storage works and details three varied deployment scenarios Read More Today!

Warrants may be needed for cell phone data, court says
In a precedent-setting decision, a federal appellate court this week ruled that judges have the option of asking prosecutors to obtain a warrant before they are allowed to access to an persons cell phone location data. Read More

Hotel operator warns of data breach
An operator of upscale hotels and resorts under such widely-known names as Marriott, Sheraton and Westin. Read More

Symantec: Most hacking victims blame themselves
Just under two-thirds of all Internet users have been hit by some sort of cybercrime, and while most of them are angry about it, a surprisingly large percentage feel guilt too, according to a survey commissioned by Symantec. Read More

After Google incident, Wi-Fi data collection goes on
Four months ago, amidst a backlash from government regulators and privacy advocates, Google stopped collecting Wi-Fi data with its Street View cars. But that doesn't mean Google has stopped collecting wireless data altogether, and neither have other companies such as Apple. Read More

Attacks on power systems: Data leakage, espionage, insider threats, sabotage
Data leakage is one of the intractable problems of information assurance because of the possibility of covert channels for extraction and exploitation of unrecognized copies of confidential data. Read More


WHITE PAPER: Tripwire

Taking the Time Crunch Out of IT Compliance with Automation
Read this exclusive white paper from compliance leader Tripwire to learn how a Protect, Detect, and Correct compliance strategy can give you back your most precious resource: time. Read More!

Hackers exploit new PDF zero-day bug, warns Adobe
Adobe today warned users that attacks have begun exploiting an unpatched bug in its popular Reader and Acrobat PDF viewing and creation software. Read More

Microsoft investigates two-year-old IE bug
Microsoft is looking into a long-known vulnerability in Internet Explorer (IE) that could be used to access users' data and Web-based accounts. Read More

Turning IAM data into intelligence
Gartner's Earl Perkins (research vice president in the security and privacy team) recently blogged about establishing a relationship between identity and access management, and business intelligence. Read More

Kaspersky Lab: Facebook facing increased phishing attacks
True to the dictum that popularity extracts its own price, Facebook has left eBay behind, becoming the second most popular target for phishers using spam e-mails. Read More

What security can learn from the $15M Sprint employee breach
Federal prosecutors this week charged nine former Sprint employees with fraud and aggravated identity theft after learning they had cloned customer cell phone numbers to make $15 million worth of calls. According to the complaint from federal prosecutors, the individuals who have been charged worked at Sprint stores in the Bronx, Bergen, N.J., and Tampa, Fla., and used company computers to get confidential information about thousands of customers. The data was used to create the so-called 'clone' cell phones. Of the $15 million worth of calls, a large percentage of them were international calls, said prosecutors. Read More

Cloud Security Alliance offers certification
IT virtual-security experts can now show off their knowledge with a certificate that shows they've mastered the contents of two cloud-security papers. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

6 useful Wi-Fi tools for Windows
Free or cheap apps can help troubleshoot your wireless network, turn your laptop into a hot spot, and more.

IT personality types: 8 profiles in geekdom
Consider this your field guide to the flora and fauna of your work life: the eight classic personality types you'll find in virtually any reasonably sized IT department.

MOST-READ STORIES

  1. DARPA looking for extreme wireless interference buster
  2. The 22 best Android apps
  3. 10 businesses you can start from your smartphone
  4. Citrix strikes surprise blow against VMware with Cisco deal
  5. The Commodore 64 lives again - as a modern PC running Ubuntu
  6. Dell to make a play for Brocade?
  7. Enterprises clinging to IE6 may hurt IE9 launch
  8. Security vendor demonstrates insider attack on VMware ESX
  9. U.S. military hackers and spies prepare to knock the world offline
  10. Cisco, Citrix team on desktop virtualization package

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: