Search This Blog

Friday, April 23, 2010

Data loss prevention comes of age; McAfee flub sets off Twitter storm

McAfee flub sets off Twitter storm | McAfee apologizes for PC anti-virus snafu

Network World Compliance

Forward this to a Friend >>>


Data loss prevention comes of age
After testing endpoint and perimeter data loss prevention products, we conclude our series with a look at DLP tools that can do both. Read More


WHITE PAPER: Oracle

Business Agility Strategies For Midsize Organizations
Midsize businesses have enormous IT pressures: building an infrastructure that is flexible, designed to accommodate rapid growth and meets compliance challenges with resources nowhere near larger enterprises. This video whitepaper explains how Oracle is delivering applications specifically for midsize businesses. Learn More

WHITE PAPER: BeyondTrust

BeyondTrust 2009 Microsoft Vulnerability Analysis
The results show that despite unpredictable and evolving attacks companies can greatly reduce risk, experience greater protection from zero-day threats and reduce the threat from vulnerabilities by removing administrator rights. Learn More

McAfee flub sets off Twitter storm
After dealing with McAfee's most recent fix that sabotaged Windows XP PC clients worldwide, users of the anti-virus software to Twitter to vent their rage, creating a public-relations and legal nightmare that will likely continue long after the last machine is patched. Read More

McAfee apologizes for PC anti-virus snafu
McAfee has apologized for its anti-virus update that took down Windows XP computers around the world, but says it affected a small percentage of its customers. Read More

DLP primer
Data Leak Protection products (DLP) are designed to help organizations keep tabs on and protect sensitive data that, if lost, could create legal liability, loss of profit, safety or security risks, and so on. Read More

Symantec readies new Norton antimalware software, offers free PC cleaners
Symantec Monday unveiled the Norton 2011 editions of its antimalware software to wipe out infections on Windows-based machines. Read More


VIRTUAL EVENT: CIO, Computerworld, CSO, InfoWorld & Network World

Live Security Panel – April 28th
Join us on April 28th for a live virtual event that will provide candid, expert advice on top security challenges and issues – all from the comfort of your desktop. Get in on the discussion - from the unique challenges presented by cloud computing and virtualization to the mass adoption of social media. Attend and you may win a Kindle!

How investigators work to combat data theft
Financial institutions once considered fraud a given risk, but also a small nuisance. Today, stopping fraud is a front-and-center priority for banks and lenders Read More

Offshore banking more secure? You're dreaming
Storing your money offshore because you think those financial institutions are safer than those close to home? Security expert Andrew Hay says you're wrong. A SOURCE Boston preview. Read More

Your BlackBerry's dirty little security secret
There are many creative ways for people to spy on you through your BlackBerry. A SOURCE Boston preview. Read More

Verifying identity in customer-not-present situations
How can a Web-based business verify the identity of a person with whom it has no prior relationship? This simple SaaS solution from IDology challenges a person to answer personal questions whose answers are unlikely to be known by others. The result is a high level of confidence that the person using the Web application is precisely who he says he is. Read More


WHITE PAPER: APC by Schneider Electric

Top 10 Server Cooling Approaches
High-density servers can present a significant cooling challenge demanding over 40kW of cooling per rack. With most data centers designed to cool an average of no more than 2kW per rack, innovative strategies must be deployed. This paper provides 10 approaches to increase cooling efficiency, cooling capacity and power density. Read Now.

Why your information security stinks & what to do
Former cybersecurity czar Amit Yoran on why information security is in a "death spiral" -- and what you can do. A SOURCE Boston preview. Read More

Where is Your Cloud? Four Compliance Best Practices
If you think the phrase "It's in the cloud" means that your data resides on the Internet and is thus accessible everywhere equally, think again. Most infrastructure-as-a-service (IaaS) cloud services share the same residence model as traditional hosting and outsourcing deployments -- they live in specific data centers in specific geographies. This means that customer data is generated and most likely stored in this physical location, giving it legal and privacy implications. Read More

Bank of the West tilts from Cisco MARS to LogRhythm
When there was a hullabaloo last November over Cisco all too quietly ending any new third-party support for the Cisco Security, Monitoring, Analysis and Response System (MARS), analysts predicted IT managers might not be as eager to fly to MARS anymore since MARS would not be expanding log collection for non-Cisco equipment in the future. Read More

Fundamental causes of spam
Unsolicited commercial – and usually fraudulent – e-mail (spam) is a constant headache for individual users and for mail-server administrators. In this second part of a three part series, I look at why we are suffering from this plague. Read More

Former hacker claims Microsoft more secure than Apple, Adobe
A seasoned hacker believes Microsoft is now more secure than both Apple and Adobe, claiming Apple has only started taking seriously in the last six months. Read More

New cloud service offers antivirus alternative
Security vendor Panda Software has announced a full cloud web security service which it claims frees smaller companies from the need to filter for malware using complicated gateway boxes. New cloud security service filters web traffic Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

12 "White Hat" hackers you should know
These "White Hat" security researchers are ethical hackers whose discoveries and inventions shake things up - as they try to stay one step ahead of their underground "Black Hat" cousins.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Flawed McAfee update paralyzes corporate PCs
  2. Alcatel-Lucent boosts broadband over copper to 300Mbps
  3. Other top-secret Apple projects found at a bar
  4. McAfee apologizes for PC anti-virus snafu
  5. The ultimate guide to Windows 7 security
  6. Former hacker claims Microsoft more secure than Apple, Adobe
  7. Is network security a dead end career?
  8. McAfee flub sets off Twitter storm
  9. Juniper attempts to lure new customers with the old switcheroo
  10. Why computer science students cheat

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: