Search This Blog

Thursday, September 22, 2011

Bigger isn't better when it comes to social engineering attacks

An Open Letter To The Information Security Industry: We Live In Amazing Times | 1 in 3 in Massachusetts had personal data compromised

Network World Security

Forward this to a Friend >>>


Bigger isn't better when it comes to social engineering attacks
When it comes to social engineering attacks, larger companies attract more of them, and when they are victimized it costs more per incident, according to a survey sponsored by Check Point. Read More


WHITE PAPER: GFI Software

Why Customers Love VIPRE Business
Selecting an antivirus solution for your organization is an important decision. VIPRE Antivirus Business is a high-performance solution that delivers fast, memory-efficient endpoint security with all the necessary functionality you need and nothing you don't — ensuring an optimal end user performance experience. Read now!

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn more!

An Open Letter To The Information Security Industry: We Live In Amazing Times
I apologize that this post is not about open source, however I think it was important enough to post up here. Read More

1 in 3 in Massachusetts had personal data compromised
Personal information on about a third of Massachusetts residents has been compromised, according to the state's attorney general, citing statistics gleaned from the tough data breach reporting law there. Read More


WHITE PAPER: PhoneFactor

Phones Become the Leading Multi-Factor Authentication Device
According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Read now

Prototype system promises 54% smartphone battery life boost
Researchers says they have created a system that can boost battery life by 54% by better managing idle-"listening" times on smartphones or other wireless devices. Read More

Data-breach insurance caters to small businesses
With the proliferation of data breaches, The Harford insurance company is selling a new data loss insurance aimed at small businesses that might be put at financial risk if they lose valuable and sensitive data. Read More


WHITE PAPER: VeriSign

Approaches to DDoS Protection - A Cost Analysis
All organizations with an online presence or dependence on Internet-based systems need to fortify their defenses against DDoS attacks. Read this paper to learn what an attack can cost an organization, how to develop a DDoS mitigation strategy, and how to get maximum protection from your investment. Read Now!

Facial recognition security, privacy issues grab FTC attention
The Federal Trade Commission the week said it will hold a workshop that examines how burgeoning use of facial recognition technology impacts privacy and security. Read More

Netflix deals with cloud security concerns
As Netflix commits its future to streaming movies to customers, it relies almost exclusively on cloud services for its infrastructure, raising security concerns that require a new way of thinking, the company's cloud security architect says. Read More

Social engineering attacks costly for business
Social engineering attacks are widespread, frequent and cost organizations thousands of dollars annually according to new research from security firm Check Point Software Technologies. Read More

Peeling the Security Onion
Setting up a properly installed and well-tuned IDS/IPS system can be time consuming. If you have ever tried to set up a fully-functional Snort system, you are familiar with the time it requires. If you want to get an IPv6-capable IDS system up and going quickly then you should look at Security Onion. Once you get it working there are also some low-cost alternatives to capture the packets and observe... Read More



SLIDESHOWS

16 essential Android apps for IT pros
There are hundreds of thousands of Android apps, including many that are useful for IT professionals on the job. These apps can help connect to servers, monitor computers, access databases, analyze the airwaves, scan networks, and serve as a reference. Here are 16 of these apps, most of them free.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Next-gen boot spec could forever lock Linux off Windows 8 PCs
  2. Lync not enterprise-ready, claims Microsoft ISV-turned-rival
  3. Terrorism with your pancakes? FBI, DHS, police raid 7 IHOP restaurants
  4. 15 essential open source tools for Windows admins
  5. Cisco, Microsoft cooperate to bring network-layer management to Hyper-V
  6. Google+ adds search (finally); now anyone can join
  7. Google preps developers for one-size-fits-all Android update
  8. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now
  9. Has Google's CEO stopped using Google+?
  10. Patent madness! A timeline of Android patent wars

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: