Search This Blog

Wednesday, September 22, 2010

Google Transparency Report shows U.S., Brazil make most data removal requests

Survey finds low use of Microsoft encryption technology | FBI Spied and Lied, Misled Justice Department on Improper Surveillance of Peace Groups

Network World Security

Forward this to a Friend >>>


Google Transparency Report shows U.S., Brazil make most data removal requests
Google has introduced a Transparency Report that lets you see which countries are asking the search company for data on its users and making requests for data removal. Read More


WHITE PAPER: SonicWALL

The Next Generation is the Smart Generation
Innovations such as mobility, Web 2.0, social media and cloud computing have dramatically changed the IT landscape and introduced new security threats into the corporate network. This eBook investigates why traditional firewalls are no longer enough, and how application intelligence and control enable network security in the wake of these changes. Read more.

WHITE PAPER: Symantec

Global Threat Intelligence for the well informed SMB
Please read the "Quick Tips for SMBs" that were gleaned from the Threat Report to learn more about how to help your company protect their business information. Read Now.

Survey finds low use of Microsoft encryption technology
Microsoft's full-disk encryption feature is not being widely used, even where it is part of the Windows operating system, according to a new survey released by security vendor Opswat. Read More

FBI Spied and Lied, Misled Justice Department on Improper Surveillance of Peace Groups
The Justice Department Inspector General (IG) discovered improper FBI spying investigations were frequently opened based upon "factually weak" justifications. The FBI classified some investigations relating to nonviolent civil disobedience under its "Acts of Terrorism" classification. Read More

Digit Manipulation
In our final CVOICE demonstration this month, we build on our previous videos and demonstrate digit manipulation using voice translation profiles. While Cisco IOS offers several options for digit manipulation, in my opinion, voice translation profiles are by far the most powerful and flexible. Read More


WHITE PAPER: Bradford Networks

Bryant University and Network Security
In 2003 Bryant University selected Bradford Networks' Campus Manager to realize new levels of security and control over network resources. It has grown with the network and is now able to register all devices, authenticate all users and automatically control network access. It is the one system that controls every entry point on the network. Read now.

Twitter fixes cross-site scripting flaw
A serious security flaw was apparently found on Twitter on Tuesday but was quickly fixed. Read More

ArcSight beefs up security range
ArcSight has announced a new range of security and compliance products Read More

ZoneAlarm angers users with virus scare pop-up
The makers of the popular ZoneAlarm firewall, Check Point Software, have been accused of using scare tactics to get users to upgrade to the paid version of the software. Read More


WEBCAST: Emerson Network Power

Hands-on DC management shouldn't give you paper cuts
This webcast demonstrates how field-proven Avocent MergePoint® Infrastructure Explorer software is already providing substantial ROI for data centers up to 500 racks. Its dynamic, graphic interface gives a deep view of your data center to help you more efficiently plan changes, lower operating costs, and deliver on-target capacity planning. Watch Now.

RIAA, MPAA Websites Pummeled By 4chan's Wrath
The Motion Picture Association of America (MPAA) and the Recording Industry Association of America (RIAA) fell victim to the wrath of 4chan members this weekend. A series of coordinated DDoS (Distributed Denial-of Service) attacks against the media trade groups' websites temporarily brought them to their knees. Read More

Microsoft sounds alert on massive Web bug
Microsoft on Friday warned users that a critical bug in ASP.Net could be exploited by attackers to hijack encrypted Web sessions and pilfer usernames and passwords from Web sites. Read More

Two-Form Authentication Gives Reason to Consider Google Apps
Google announced that it is implementing two-factor authentication for Google Apps to improve security. The introduction of more stringent authentication controls removes one of the hurdles for businesses to embrace Google Apps and makes the productivity suite a more viable option for organizations concerned with security in the cloud. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

5 Strange Ways iPhones Die: Insurer Hears it All
What do toilets, beer and elevators have in common? They all send many iPhones to their death, says consumer electronics insurer Worth Ave. Group, which shared some unfortunate tales of iPhone disaster.

Ultimate guide to the flat data center network
The traditional three-tier network had a good run, but its age is starting to show in today's brave new world of server consolidation, virtual machines, cloud computing and 10Gigabit switches. Here's a look at where we've been and where we might be headed.

MOST-READ STORIES

  1. Was Stuxnet built to attack Iran's nuclear program?
  2. How to hack IP voice and video in real-time
  3. Microsoft sounds alert on massive Web bug
  4. 7-inch Apple iPad rumors surface again
  5. Stuff I learned from my three biggest network screw ups
  6. Bandwidth is not speed
  7. Inside Intel's security organization
  8. Avaya CEO: How video will change business world
  9. Microsoft HPC claim: Windows is cheaper than Linux
  10. Which is the best open source DB of them all?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: