Search This Blog

Friday, December 18, 2009

New laws complicate security efforts in 2010; Hot security predictions for 2010

Hot security predictions for 2010; 10 Predictions for 2010: Kaminsky and Weatherford
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by IBM
rule

Improve Web Application Security
Companies have relied on perimeter defenses to keep their networks and data secure. Unfortunately, network firewalls and network vulnerability scanners can't defend against application-level attacks. Since so many Web sites contain vulnerabilities, hackers can leverage a relatively simple exploit to gain access to a wealth of sensitive information, such as credit card data, social security numbers and health records. It's more important than ever to examine your Web application security, assess your vulnerability and take action to protect your business.

Learn More Now

rule

Spotlight Story
New laws complicate security efforts in 2010

Regulatory compliance will continue to influence security projects in 2010 as a slew of new security and privacy regulations go into effect, such as the federal HITECH Act. Read full story

Related News:

Hot security predictions for 2010
Looking forward to 2010 while trying to erase the memory of 2009 -- here are my security predictions for the new year.

10 Predictions for 2010: Kaminsky and Weatherford
Curious about what's going to happen to our critical IT infrastructure in 2010? Here, IT security luminaries Mark Weatherford, CISO for California State, and Dan Kaminsky, finder of last year's DNS flaw, offer five predictions each. (The first of 2 parts).

Rogue antivirus lurks behind Google Doodle searches
In Esperanto the word is "malica." It means malicious and it's the best way of describing many of the search results Google visitors got Tuesday when the clicked on Google's front-page Doodle sketch, dedicated to Esperanto's creator.

Mass. Supreme Court throws out lawsuit against BJs over '04 data breach
The Massachusetts Supreme Judicial Court affirmed a lower court ruling dismissing a lawsuit brought against by BJs dozens of credit unions over a 2004 data breach.

Adobe offers advice on avoiding new Reader attack
One day after warning of a new attack on its Reader and Acrobat software, Adobe issued a security advisory Tuesday offering users some advice on how to mitigate the problem.

Five Things You Need to Know About Social Engineering
SOCIAL ENGINEERING IS GROWING UP. Social engineering, the act of tricking people into giving up sensitive information, is nothing new. Convicted hacker Kevin Mitnick made a name for himself by cold-calling staffers at major U.S. companies and talking them into giving him information. But today's criminals are having a heyday using e-mail and social networks. A well-written phishing message or virus-laden spam campaign is a cheap, effective way for criminals to get the data they need.

Firefox Update Fixes Three Critical Flaws
Mozilla yesterday released Firefox version 3.5.6. The update resolves three critical security holes, and also patches up some stability issues.

Microsoft's acquisition of Sentillion stands out
It took until December, but what could be the biggest acquisition story of the year broke last week. At least until Oracle's buyout of Sun gets EU approval, Microsoft's acquisition of Sentillion will be the big one.

Hackers are defeating tough authentication, Gartner warns
Security measures such as one-time passwords and phone-based user authentication, considered among the most robust forms of security, are no longer enough to protect online banking transactions against fraud, a new report from research firm Gartner Inc. warns.

ActivIdentity acquires CoreStreet in $20 million deal
ActivIdentity has reached an agreement to acquire CoreStreet in a primarily cash deal worth about $20 million.

Akamai service to stop data center attacks
Akamai Technologies is introducing a cloud-based managed service called Web Application Firewall it claims will head off the bulk of Web applications attacks before they get inside corporate data centers.

Facebook Privacy: Zuckerberg's Profile Unzipped
How much personal information can you glean from Facebook Chief Executive Mark Zuckerberg's profile? That depends on when you happened to be viewing it.

Today from the Subnet communities

On Cisco Subnet:Are Cisco's acquisitions working for the company? and iACLs; A Service Providers Best Practice on your LAN; On Microsoft Subnet Microsoft Exchange 2010: A hard upgrade and not yet in the cloud: On Google Subnet: 10 best Chrome extensions

Network World on Twitter? You bet we are


Decade in tech
Ethernet everywhereHere is a quiz on the most important or quirkiest tech stories to hit the front pages over the first 10 years of the 2000s.

Cool Yule Tools
Windows 7Best picks from this year and a look back at 10 years of tech toys and gadgety gifts.

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.
Learn more


Getting the Right Foundation: Unified Communications
IP telephony is moving into its second decade with enormous momentum, most users are still waiting for full convergence and voice-enabled applications. Increased network efficiencies have been the primary benefit of IP telephony to date as enterprises struggle with infrastructure and organizational issues. These first-generation benefits have been considerable, but the focus is now shifting to converged applications, with the initial spotlight on Unified Communications (UC).
Learn more now.

 

December 18, 2009

MOST-READ STORIES

  1. Is Windows 7 the last major chapter in Windows story?
  2. Bank's antifraud tactics stun security expert
  3. AT&T lashes out at Fake Steve Jobs' threat
  4. The 10 best Chrome extensions for work and play
  5. 10 wacky USB devices
  6. Open source, Linux set for unheralded coronation in 2010
  7. Watch out Microsoft: GNOME is poised to have a killer 2010
  8. IT departments need right skills to recover in 2010
  9. Hot security predictions for 2010
  10. Will 2010 be the year of IPv6?

FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process.
Click here.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: