Search This Blog

Monday, September 27, 2010

How the FBI is aligning with biometrics

51% of firms send unwanted spam emails | 39% of students share passwords with friends and family

Network World Security

Forward this to a Friend >>>


How the FBI is aligning with biometrics
Sept. 24, 2010 - Dr. Alice Isenberg, chief of the Biometrics Analysis Section at the FBI, talks about the FBI's lab work and integrating with the biometrics community. The speech was at the Biometric Consortium Conference 2010 in Tampa, Fla. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Cisco

Security in the Cloud
This technology dossier contains four papers that address security considerations in cloud computing. It includes IDG Research results on what IT managers have to say about cloud security, executive viewpoints on blending cloud solutions to optimize security, and a strategy paper that addresses protecting data. Read now!

51% of firms send unwanted spam emails
More than half (51 percent) of online retailers are spamming web user with emails that have not requested to receive, says Spam Ratings. Read More

39% of students share passwords with friends and family
Nearly four in ten web users aged 18 to 25 share passwords with friends and family, says AVG. Read More


WHITE PAPER: NetGear

How Internet Usage Puts Your Business at Risk
Businesses rely heavily on the Internet as an essential part of their day-to-day operations. It offers fast access to information and 24x7 communications with the outside world. Despite the overwhelming benefits the Internet offers, it also puts companies at risk from an array of security threats. Learn more.

UK survey aims to quantify prevalence of cyber stalking
A U.K. organization is conducting a survey to gauge the prevalence of cyberstalking, an undocumented problem that may be becoming increasingly prevalent. Read More

Top brands deluge customers with 'unwanted email'
PC World, JD Sports, Woolworths, Aldi, B&Q and Arcadia Group have been named and shamed as the UK brands most likely to 'spam' customers with unwanted email, according to a new analysis. Read More


WHITE PAPER: F5 Networks, Inc.

The Antidote to DNS Cache Poisoning and Other DNS Attacks
Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn't working, then your business likely isn't either. Secure your business and web presence with Domain Name System Security Extensions (DNSSEC). Learn more!

Man gets 10 years for VoIP hacking
A Venezuelan man was sentenced to 10 years in prison Friday for stealing and then reselling more than 10 million minutes of Internet phone service. Read More

Meeting the new PCI wireless requirements
Beginning Sept. 30, Visa will require merchants and related businesses to conduct wireless security scans to prove compliance with version 1.2 of the PCI Data Security Standard (PCI DSS) which is designed to safeguard cardholder data from wireless threats. Read More

The InfoWorld expert guide to Web browser security
Today's Web browsers have different security pros and cons, and none offers a magic bullet against threats. Here's how to keep your Web surfing secure Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

5 Strange Ways iPhones Die: Insurer Hears it All
What do toilets, beer and elevators have in common? They all send many iPhones to their death, says consumer electronics insurer Worth Ave. Group, which shared some unfortunate tales of iPhone disaster.

Ultimate guide to the flat data center network
The traditional three-tier network had a good run, but its age is starting to show in today's brave new world of server consolidation, virtual machines, cloud computing and 10Gigabit switches. Here's a look at where we've been and where we might be headed.

MOST-READ STORIES

  1. Facebook apologizes for worst outage in four years
  2. 'Preliminary' finding invalidates VoIP patent, says EFF
  3. Gartner: Global 'IT debt' hits $500 billion, on the way to $1 trillion
  4. Cisco refreshes SMB portfolio
  5. China's 'big hole' marks scale of supercomputing race
  6. Cisco releases critical IOS security patches
  7. ACLU report: Spying on free speech nearly at Cold War level
  8. U.S. military takes cloud computing to Afghanistan
  9. Carry an instant Windows 7 hotspot in your pocket
  10. Was Stuxnet built to attack Iran's nuclear program?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: